0
Your cart

Your cart is empty

Price
  • R50 - R100 (7)
  • R100 - R250 (240)
  • R250 - R500 (795)
  • R500+ (8,198)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

A Simple Guide to Technology and Analytics (Hardcover): Brian J Evans A Simple Guide to Technology and Analytics (Hardcover)
Brian J Evans
R2,166 Discovery Miles 21 660 Ships in 10 - 15 working days

Everyday technology is constantly changing, and it's hard to keep up with it at times. What is all this talk about automation, STEM, analytics and super-computers, and how will it really affect my daily life at work and in the home? This book is a simple guide to everyday technology and analytics written in plain language. It starts with explaining how computer networks are increasing in speed so fast that we can do more in less time than ever before. It explains the analytical jargon in plain English and why robotics in the home will be aided by the new technology of the quantum computer. Richly furnished with over 200 illustrations, photos and with minimal equations, A Simple Guide to Technology and Analytics is a ready reference book for those times when you don't really understand the technology and analytics being talked about. It explains complicated topics such as automated character recognition in a very simple way, and has simple exercises for the reader to fully understand the technology (with answers at the back). It even has explanations on how home appliances work, which are very useful the next time you go shopping for a microwave or TV. Even the Glossary at the back can be used as a quick look-up explanation for those on the go.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,154 Discovery Miles 21 540 Ships in 10 - 15 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Paperback): Stephen... Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Paperback)
Stephen Ashurst, Stefano Tempesta
R1,402 Discovery Miles 14 020 Ships in 10 - 15 working days

Blockchain is the popular name given to the exciting, evolving world of distributed ledger technology (DLT). Blockchains offer equitable and secure access to data, as well as transparency and immutability. Organisations can decide to use blockchain to upgrade whatever ledgers they are currently deploying (for example, relational databases, spreadsheets and cumbersome operating models) for their data and technology stack in terms of books and records, transactions, storage, production services and in many other areas. This book describes the applied use of blockchain technology in the enterprise world. Written by two expert practitioners in the field, the book is in two main parts: (1) an introduction to the history of, and a critical context explainer about, the emergence of blockchain written in natural language and providing a tour of the features, functionality and challenges of blockchain and DLT; and (2) a series of six applied organisational use cases in (i) trade finance, (ii) healthcare, (iii) retail savings & investments, (iv) real estate, (v) central bank digital currencies (CBDC) and (vi) fund management that offer the reader a straightforward, easy-to-read comparison between 'old world' technology (such as platforms, people and processes) versus what blockchain ledgers offer to enterprises and organisations in terms of improved efficiency, performance, security and access to business data. Blockchain is sometimes tainted by association to Bitcoin, Onecoin and others. But as cryptocurrencies and stock markets continue to rise and fall with volatility and the world economy emerges changed by coronavirus, working from home and the threat of inflation, many enterprises, organisations and governments are looking again at the powerful features of blockchain and wondering how DLT may help them adapt. This book is an ideal introduction to the practical and applied nature of blockchain and DLT solutions for business executives, business students, managers, C-suite senior leaders, software architects and policy makers and sets out, clearly and professionally, the benefits and challenges of the actual business applications of blockchain.

Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Hardcover): Stephen... Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Hardcover)
Stephen Ashurst, Stefano Tempesta
R4,224 Discovery Miles 42 240 Ships in 10 - 15 working days

Blockchain is the popular name given to the exciting, evolving world of distributed ledger technology (DLT). Blockchains offer equitable and secure access to data, as well as transparency and immutability. Organisations can decide to use blockchain to upgrade whatever ledgers they are currently deploying (for example, relational databases, spreadsheets and cumbersome operating models) for their data and technology stack in terms of books and records, transactions, storage, production services and in many other areas. This book describes the applied use of blockchain technology in the enterprise world. Written by two expert practitioners in the field, the book is in two main parts: (1) an introduction to the history of, and a critical context explainer about, the emergence of blockchain written in natural language and providing a tour of the features, functionality and challenges of blockchain and DLT; and (2) a series of six applied organisational use cases in (i) trade finance, (ii) healthcare, (iii) retail savings & investments, (iv) real estate, (v) central bank digital currencies (CBDC) and (vi) fund management that offer the reader a straightforward, easy-to-read comparison between 'old world' technology (such as platforms, people and processes) versus what blockchain ledgers offer to enterprises and organisations in terms of improved efficiency, performance, security and access to business data. Blockchain is sometimes tainted by association to Bitcoin, Onecoin and others. But as cryptocurrencies and stock markets continue to rise and fall with volatility and the world economy emerges changed by coronavirus, working from home and the threat of inflation, many enterprises, organisations and governments are looking again at the powerful features of blockchain and wondering how DLT may help them adapt. This book is an ideal introduction to the practical and applied nature of blockchain and DLT solutions for business executives, business students, managers, C-suite senior leaders, software architects and policy makers and sets out, clearly and professionally, the benefits and challenges of the actual business applications of blockchain.

Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints (Hardcover): Jinling Liang, Zidong Wang, Fan... Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints (Hardcover)
Jinling Liang, Zidong Wang, Fan Wang
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

This book presents up-to-date research developments and novel methodologies regarding recursive filtering for 2-D shift-varying systems with various communication constraints. It investigates recursive filter/estimator design and performance analysis by a combination of intensive stochastic analysis, recursive Riccati-like equations, variance-constrained approach, and mathematical induction. Each chapter considers dynamics of the system, subtle design of filter gains, and effects of the communication constraints on filtering performance. Effectiveness of the derived theories and applicability of the developed filtering strategies are illustrated via simulation examples and practical insight. Features:- Covers recent advances of recursive filtering for 2-D shift-varying systems subjected to communication constraints from the engineering perspective. Includes the recursive filter design, resilience operation and performance analysis for the considered 2-D shift-varying systems. Captures the essence of the design for 2-D recursive filters. Develops a series of latest results about the robust Kalman filtering and protocol-based filtering. Analyzes recursive filter design and filtering performance for the considered systems. This book aims at graduate students and researchers in mechanical engineering, industrial engineering, communications networks, applied mathematics, robotics and control systems.

Partnering with HMS: A Guide for App Developers (Hardcover): Xihai Wang, Yue Wang, Hailiang Wu Partnering with HMS: A Guide for App Developers (Hardcover)
Xihai Wang, Yue Wang, Hailiang Wu; Contributions by Zhang Zhou
R3,366 Discovery Miles 33 660 Ships in 18 - 22 working days

Partnering with HMS: A Guide for App Developers is the first book to introduce readers to the Huawei Mobile Services (HMS) ecosystem. It gives developers a fundamental understanding of the ecosystem and how to leverage kit and tool capabilities to make their apps better. This book is also a quick start guide for kit integration and practical environment setup, detailing the functions and principles behind each kit. By demonstrating how to integrate kits, the authors teach these kits by action: Account Kit, IAP, Push Kit, Location Kit, Map Kit, Site Kit, Safety Detect, and FIDO. Readers are fully introduced to how they can use HMS open capabilities to develop quality apps, acquire users, and monetize their hard work. In addition, the ecosystem background - the business model and value chain that underpin the entire ecosystem as well as its privacy compliance framework - is crucial to operations and illustrated in this book.

Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics (Hardcover): R. Sujatha, S. L. Aarthy, R.... Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics (Hardcover)
R. Sujatha, S. L. Aarthy, R. Vettriselvan
R3,649 Discovery Miles 36 490 Ships in 10 - 15 working days

Provides insight into the skill set that requires leveraging strength to move further to act as a good data analyst Discusses how big data along with deep learning holds the potential to significantly increase data understanding and in turn, helps to make decisions Covers the numerous potential applications in healthcare, education, communications, media, and the entertainment industry Offers innovative platforms for integrating big data and deep learning Presents issues related to adequate data storage, sematic indexing, data tagging, and fast information retrieval from big data

tmux 2 (Paperback): Brian P. Hogan tmux 2 (Paperback)
Brian P. Hogan
R561 R470 Discovery Miles 4 700 Save R91 (16%) Ships in 10 - 15 working days

Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.2, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row. You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.2, you can improve your productivity and regain your focus. This book will show you how. This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10. Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system. Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.

Model-Driven Engineering of Information Systems - Principles, Techniques, and Practice (Paperback): Liviu Gabriel Cretu, Florin... Model-Driven Engineering of Information Systems - Principles, Techniques, and Practice (Paperback)
Liviu Gabriel Cretu, Florin Dumitriu
R2,447 Discovery Miles 24 470 Ships in 18 - 22 working days

This title includes a number of Open Access chapters. Model-driven engineering (MDE) is the automatic production of software from simplified models of structure and functionality. It mainly involves the automation of the routine and technologically complex programming tasks, thus allowing developers to focus on the true value-adding functionality that the system needs to deliver. This book serves an overview of some of the core topics in MDE. The volume is broken into two sections offering a selection of papers that helps the reader not only understand the MDE principles and techniques, but also learn from practical examples. Also covered are the following topics: * MDE for software product lines * Formal methods for model transformation correctness * Metamodeling with Eclipse eCore * Metamodeling with UML profiles * Test cases generation This easily accessible reference volume offers a comprehensive guide to this rapidly expanding field. Edited by experienced writers with experience in both research and the practice of software engineering, Model-Driven Engineering of Information Systems: Principles, Techniques and Practice is an authoritative and easy-to-use reference, ideal for both researchers in the field and students who wish to gain an overview to this important field of study.

Linux Yourself - Concept and Programming (Hardcover): Sunil K. Singh Linux Yourself - Concept and Programming (Hardcover)
Sunil K. Singh
R4,460 Discovery Miles 44 600 Ships in 10 - 15 working days

Numerous people still believe that learning and acquiring expertise in Linux is not easy, that only a professional can understand how a Linux system works. Nowadays, Linux has gained much popularity both at home and at the workplace. Linux Yourself: Concept and Programming aims to help and guide people of all ages by offering a deep insight into the concept of Linux, its usage, programming, administration, and several other connected topics in an easy approach. This book can also be used as a textbook for undergraduate/postgraduate engineering students and others who have a passion to gain expertise in the field of computer science/information technology as a Linux developer or administrator. The word "Yourself" in the title refers to the fact that the content of this book is designed to give a good foundation to understand the Linux concept and to guide yourself as a good Linux professional in various platforms. There are no prerequisites to understand the contents from this book, and a person with basic knowledge of C programming language will be able to grasp the concept with ease. With this mindset, all the topics are presented in such a way that it should be simple, clear, and straightforward with many examples and figures. Linux is distinguished by its own power and flexibility, along with open-source accessibility and community as compared to other operating systems, such as Windows and macOS. It is the author's sincere view that readers of all levels will find this book worthwhile and will be able to learn or sharpen their skills. KEY FEATURES Provides a deep conceptual learning and expertise in programming skill for any user about Linux, UNIX, and their features. Elaborates GUI and CUI including Linux commands, various shells, and the vi editor Details file management and file systems to understand Linux system architecture easily Promotes hands-on practices of regular expressions and advanced filters, such as sed and awk through many helpful examples Describes an insight view of shell scripting, process, thread, system calls, signal, inter-process communication, X Window System, and many more aspects to understand the system programming in the Linux environment Gives a detailed description of Linux administration by elaborating LILO, GRUB, RPM-based package, and program installation and compilation that can be very helpful in managing the Linux system in a very efficient way Reports some famous Linux distributions to understand the similarity among all popular available Linux and other features as case studies

Opportunistic Networks - Fundamentals, Applications and Emerging Trends (Hardcover): Anshul Verma, Pradeepika Verma, Sanjay... Opportunistic Networks - Fundamentals, Applications and Emerging Trends (Hardcover)
Anshul Verma, Pradeepika Verma, Sanjay Kumar Dhurandher, Isaac Woungang
R4,088 Discovery Miles 40 880 Ships in 10 - 15 working days

The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover): Chinmay Chakraborty, Sree Ranjani... Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover)
Chinmay Chakraborty, Sree Ranjani Rajendran, Muhammad Habibur Rehman
R4,510 Discovery Miles 45 100 Ships in 10 - 15 working days

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

Communication Architectures for Systems-on-Chip (Paperback): Jose L. Ayala Communication Architectures for Systems-on-Chip (Paperback)
Jose L. Ayala
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

A presentation of state-of-the-art approaches from an industrial applications perspective, Communication Architectures for Systems-on-Chip shows professionals, researchers, and students how to attack the problem of data communication in the manufacture of SoC architectures. With its lucid illustration of current trends and research improving the performance, quality, and reliability of transactions, this is an essential reference for anyone dealing with communication mechanisms for embedded systems, systems-on-chip, and multiprocessor architectures-or trying to overcome existing limitations. Exploring architectures currently implemented in manufactured SoCs-and those being proposed-this book analyzes a wide range of applications, including: Well-established communication buses Less common networks-on-chip Modern technologies that include the use of carbon nanotubes (CNTs) Optical links used to speed up data transfer and boost both security and quality of service (QoS) The book's contributors pay special attention to newer problems, including how to protect transactions of critical on-chip information (personal data, security keys, etc.) from an external attack. They examine mechanisms, revise communication protocols involved, and analyze overall impact on system performance.

Artificial Intelligence for Business Optimization - Research and Applications (Hardcover): Bhuvan Unhelkar, Tad Gonsalves Artificial Intelligence for Business Optimization - Research and Applications (Hardcover)
Bhuvan Unhelkar, Tad Gonsalves
R2,594 Discovery Miles 25 940 Ships in 10 - 15 working days

This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit. By considering business strategies, business process modeling, quality assurance, cybersecurity, governance and big data and focusing on functions, processes, and people's behaviors it helps businesses take a truly holistic approach to business optimization. It contains practical examples that make it easy to understand the concepts and apply them. It is written for practitioners (consultants, senior executives, decision-makers) dealing with real-life business problems on a daily basis, who are keen to develop systematic strategies for the application of AI/ML/BD technologies to business automation and optimization, as well as researchers who want to explore the industrial applications of AI and higher-level students.

Computational Design - Technology, Cognition and Environments (Hardcover): Rongrong Yu, Ning Gu, Michael J. Ostwald Computational Design - Technology, Cognition and Environments (Hardcover)
Rongrong Yu, Ning Gu, Michael J. Ostwald
R4,647 Discovery Miles 46 470 Ships in 10 - 15 working days

New computational design tools have evolved rapidly and been increasingly applied in the field of design in recent years, complimenting and even replacing the traditional design media and approaches. Design as both the process and product are changing due to the emergence and adoption of these new technologies. Understanding and assessing the impact of these new computational design environments on design and designers is important for advancing design in the contemporary context. Do these new computational environments support or hinder design creativity? How do those tools facilitate designers' thinking? Such knowledge is also important for the future development of design technologies. Research shows that design is never a mysterious non-understandable process, for example, one general view is that design process shares a common analysis-synthesis-evaluation model, during which designers interact between design problem and solution spaces. Understanding designers' thinking in different environments is the key to design research, education and practice. This book focuses on emerging computational design environments, whose impact on design and designers have not been comprehensively and systematically studied. It comprises three parts. The history and recent developments of computational design technologies are introduced in Part I. The main categories of technologies cover from computer-aided drafting and modelling tools, to visual programming and scripting tools for algorithmic design, to advanced interfaces and platforms for interactions between designers, between designers and computers, and between the virtual environment and the physical reality. To critically explore design thinking, especially in these new computational design environments, formal approaches to studying design thinking and design cognition are introduced and compared in Part II, drawing on literature and studies from the 70s to the current era. Part III concludes the book by exploring the impact of different computational design technologies on design and designers, using a series of case studies conducted by the author team building on their close collaboration over the past five years. The book offers new insights into designers' thinking in the rapidly evolving computational design environments, which have not been critically and systematically studied and reported in the current literature. The book is meant for design researchers, educators and students, professional practitioners and consultants, as well as people who are interested in computational design in general.

Pragmatic Flutter - Building Cross-Platform Mobile Apps for Android, iOS, Web, & Desktop (Hardcover): Priyanka Tyagi Pragmatic Flutter - Building Cross-Platform Mobile Apps for Android, iOS, Web, & Desktop (Hardcover)
Priyanka Tyagi
R3,385 Discovery Miles 33 850 Ships in 10 - 15 working days

Have you ever thought of creating beautiful, blazing-fast native apps for iOS and Android from a single codebase? Have you dreamt of taking your native apps to the web and desktop without it costing a fortune? If so, Pragmatic Flutter: Building Cross-Platform Mobile Apps for Android, iOS, Web & Desktop is the right place to start your journey to developing cross-platform apps. Google's Flutter is the brand-new way for developing beautiful, fluid, and blazing-fast cross-platform apps for Android, iOS, web, and desktops (macOS, Linux, Windows). Google's new Fuchsia OS user interface (UI) is implemented using Flutter as well. Learning to develop mobile apps with Flutter opens the door to multiple devices, form-factors, and platforms using a single codebase. You don't need any prior experience using Dart to follow along in this book; however, it's recommended that readers have some familiarity with writing code using one of the object-oriented programming languages. Your journey starts with learning to structure and organize the Flutter project to develop apps for multiple platforms. Next, you will explore the fundamentals of Flutter widgets. The journey continues with Flutter's layout widgets while also learning to build responsive layouts. You will get an understanding of organizing and applying themes and styles, handling user input, and gestures. Then you will move on to advanced concepts, such as fetching data over the network and integrating and consuming REST API in your app. You will get hands-on experience on design patterns, data modeling, routing, and navigation for multi-screen apps. When you are finished, you will have a solid foundational knowledge of Flutter that will help you move on to building great and successful mobile apps that can be deployed to Android, iOS, web, and desktop (macOS, Linux, Windows) platforms from a single codebase.

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,740 Discovery Miles 17 400 Ships in 10 - 15 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Location-Based Services Handbook - Applications, Technologies, and Security (Paperback): Syed Ahson, Mohammad Ilyas Location-Based Services Handbook - Applications, Technologies, and Security (Paperback)
Syed Ahson, Mohammad Ilyas
R2,270 Discovery Miles 22 700 Ships in 10 - 15 working days

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of technologies for positioning and localizing, including range- and proximity-based localization methods, and environment-based location estimation methods. Featuring valuable contributions from field experts around the world, this book addresses existing and future directions of LBS technology, exploring how it can be used to optimize resource allocation and improve cooperation in wireless networks. It is a self-contained, comprehensive resource that presents: A detailed description of the wireless location positioning technology used in LBS Coverage of the privacy and protection procedure for cellular networks-and its shortcomings An assessment of threats presented when location information is divulged to unauthorized parties Important IP Multimedia Subsystem and IMS-based presence service proposals The demand for navigation services is predicted to rise by a combined annual growth rate of more than 104 percent between 2008 and 2012, and many of these applications require efficient and highly scalable system architecture and system services to support dissemination of location-dependent resources and information to a large and growing number of mobile users. This book offers tools to aid in determining the optimal distance measurement system for a given situation by assessing factors including complexity, accuracy, and environment. It provides an extensive survey of existing literature and proposes a novel, widely applicable, and highly scalable architecture solution. Organized into three major sections-applications, technologies, and security-this material fully covers various location-based applications and the impact they will have on the future.

iPad Portable Genius, 4th Edition (Paperback, 4th Edition): P. McFedries iPad Portable Genius, 4th Edition (Paperback, 4th Edition)
P. McFedries
R450 R419 Discovery Miles 4 190 Save R31 (7%) Ships in 18 - 22 working days

Increase your iPad IQ with this genius-level guide to the Apple iPad If you want to squeeze every last bit of incredible from your Apple iPad we've got you covered with this newly revised iPad Portable Genius. Want to learn how to connect to a network? How to configure your tablet? How to surf the web more comfortably? All while keeping your identity and accounts private and secure? With the iPad Portable Genius as your guide, you'll unlock the full potential of your iPad in no time at all. You'll learn how to: Get the most out of sending and receiving your email Have fun with your images and take crystal-clear photos every time Shoot and edit video right on your iPad Manage your busy schedule with calendars Perfect for anyone looking to save time and reveal the true power and flexibility of their iPad, the iPad Portable Genius, Fourth Edition contains all the new, engaging, and extensively illustrated info you need to master your tablet.

Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Paperback): James Bone Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Paperback)
James Bone
R1,294 Discovery Miles 12 940 Ships in 10 - 15 working days

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

Practitioner's Guide to Business Impact Analysis (Paperback): Priti Sikdar Practitioner's Guide to Business Impact Analysis (Paperback)
Priti Sikdar
R1,334 Discovery Miles 13 340 Ships in 10 - 15 working days

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists and flow diagrams that give the roadmap to collect, collate and analyze data, and give enterprise management the entire mapping for controls that comprehensively covers all compliance that the enterprise is subject to have. The book helps professionals build a control framework tailored for an enterprise that covers best practices and relevant standards applicable to the enterprise. Presents a practical approach to assessing security, performance and business continuity needs of the enterprise Helps readers understand common objectives for audit, compliance, internal/external audit and assurance. Demonstrates how to build a customized controls framework that fulfills common audit criteria, business resilience needs and internal monitoring for effectiveness of controls Presents an Integrated Audit approach to fulfill all compliance requirements

Edge Computing and Capability-Oriented Architecture (Hardcover): Haishi Bai, Boris Scholl Edge Computing and Capability-Oriented Architecture (Hardcover)
Haishi Bai, Boris Scholl
R2,596 Discovery Miles 25 960 Ships in 10 - 15 working days

Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Hardware and software pattern maturity have reached a tipping point so that scenarios like smart homes, smart factories, smart buildings, smart cities, smart grids, smart cars, smart highways are in reach of becoming a reality. While there is a great desire to bring born-in-the-cloud patterns and technologies such as zero-downtime software and hardware updates/upgrades to the edge, developers and operators alike face a unique set of challenges due to environmental differences such as resource constraints, network availability and heterogeneity of the environment. The first part of the book discusses various edge computing patterns which the authors have observed, and the reasons why these observations have led them to believe that there is a need for a new architectural paradigm for the new problem domain. Edge computing is examined from the app designer and architect's perspectives. When they design for edge computing, they need a new design language that can help them to express how capabilities are discovered, delivered and consumed, and how to leverage these capabilities regardless of location and network connectivity. Capability-Oriented Architecture is designed to provide a framework for all of these. This book is for everyone who is interested in understanding what ubiquitous and edge computing means, why it is growing in importance and its opportunities to you as a technologist or decision maker. The book covers the broad spectrum of edge environments, their challenges and how you can address them as a developer or an operator. The book concludes with an introduction to a new architectural paradigm called capability-based architecture, which takes into consideration the capabilities provided by an edge environment. .

Digital Twin Technology (Paperback): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Paperback)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R1,461 Discovery Miles 14 610 Ships in 10 - 15 working days
Engineering Production-Grade Shiny Apps (Paperback): Colin Fay, Sebastien Rochette, Vincent Guyader, Cervan Girard Engineering Production-Grade Shiny Apps (Paperback)
Colin Fay, Sebastien Rochette, Vincent Guyader, Cervan Girard
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

Focused on practical matters: this book will not cover Shiny concepts, but practical tools and methodologies to use for production. Based on experience: this book will be a formalization of several years of experience building Shiny applications. Original content: this book will present new methodology and tooling, not just do a review of what already exists.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Individuality in Language Change
Lynn Anthonissen Hardcover R3,464 Discovery Miles 34 640
Japanese Syntax in Comparative…
Mamoru Saito Hardcover R3,850 Discovery Miles 38 500
English Vocabulary Elements - A Course…
William R. Leben, Brett Kessler, … Hardcover R2,444 Discovery Miles 24 440
The Syntax of Ellipsis - Evidence from…
Jeroen Van Craenenbroeck Hardcover R2,156 Discovery Miles 21 560
Aorists and Perfects - Synchronic and…
Marc Fryd, Pierre-Don Giancarli Paperback R2,111 Discovery Miles 21 110
Locality
Enoch Olade Aboh, Maria Teresa Guasti, … Hardcover R3,759 Discovery Miles 37 590
Minimalist Analysis
H Lasnik Hardcover R3,763 Discovery Miles 37 630
Sentence Conjunctions in the Gospel of…
Stephanie Black Hardcover R5,943 Discovery Miles 59 430
Micro-Syntactic Variation in North…
Raffaella Zanuttini, Laurence Horn Hardcover R3,855 Discovery Miles 38 550
The Oxford Handbook of Information…
Caroline Fery, Shinichiro Ishihara Hardcover R4,569 Discovery Miles 45 690

 

Partners