0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (374)
  • R250 - R500 (1,200)
  • R500+ (9,113)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Paperback): Stephen... Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Paperback)
Stephen Ashurst, Stefano Tempesta
R1,288 Discovery Miles 12 880 Ships in 12 - 17 working days

Blockchain is the popular name given to the exciting, evolving world of distributed ledger technology (DLT). Blockchains offer equitable and secure access to data, as well as transparency and immutability. Organisations can decide to use blockchain to upgrade whatever ledgers they are currently deploying (for example, relational databases, spreadsheets and cumbersome operating models) for their data and technology stack in terms of books and records, transactions, storage, production services and in many other areas. This book describes the applied use of blockchain technology in the enterprise world. Written by two expert practitioners in the field, the book is in two main parts: (1) an introduction to the history of, and a critical context explainer about, the emergence of blockchain written in natural language and providing a tour of the features, functionality and challenges of blockchain and DLT; and (2) a series of six applied organisational use cases in (i) trade finance, (ii) healthcare, (iii) retail savings & investments, (iv) real estate, (v) central bank digital currencies (CBDC) and (vi) fund management that offer the reader a straightforward, easy-to-read comparison between 'old world' technology (such as platforms, people and processes) versus what blockchain ledgers offer to enterprises and organisations in terms of improved efficiency, performance, security and access to business data. Blockchain is sometimes tainted by association to Bitcoin, Onecoin and others. But as cryptocurrencies and stock markets continue to rise and fall with volatility and the world economy emerges changed by coronavirus, working from home and the threat of inflation, many enterprises, organisations and governments are looking again at the powerful features of blockchain and wondering how DLT may help them adapt. This book is an ideal introduction to the practical and applied nature of blockchain and DLT solutions for business executives, business students, managers, C-suite senior leaders, software architects and policy makers and sets out, clearly and professionally, the benefits and challenges of the actual business applications of blockchain.

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R2,036 Discovery Miles 20 360 Ships in 12 - 17 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

A Simple Guide to Technology and Analytics (Hardcover): Brian J Evans A Simple Guide to Technology and Analytics (Hardcover)
Brian J Evans
R2,081 Discovery Miles 20 810 Ships in 12 - 17 working days

Everyday technology is constantly changing, and it's hard to keep up with it at times. What is all this talk about automation, STEM, analytics and super-computers, and how will it really affect my daily life at work and in the home? This book is a simple guide to everyday technology and analytics written in plain language. It starts with explaining how computer networks are increasing in speed so fast that we can do more in less time than ever before. It explains the analytical jargon in plain English and why robotics in the home will be aided by the new technology of the quantum computer. Richly furnished with over 200 illustrations, photos and with minimal equations, A Simple Guide to Technology and Analytics is a ready reference book for those times when you don't really understand the technology and analytics being talked about. It explains complicated topics such as automated character recognition in a very simple way, and has simple exercises for the reader to fully understand the technology (with answers at the back). It even has explanations on how home appliances work, which are very useful the next time you go shopping for a microwave or TV. Even the Glossary at the back can be used as a quick look-up explanation for those on the go.

Partnering with HMS: A Guide for App Developers (Hardcover): Xihai Wang, Yue Wang, Hailiang Wu Partnering with HMS: A Guide for App Developers (Hardcover)
Xihai Wang, Yue Wang, Hailiang Wu; Contributions by Zhang Zhou
R3,189 Discovery Miles 31 890 Ships in 12 - 17 working days

Partnering with HMS: A Guide for App Developers is the first book to introduce readers to the Huawei Mobile Services (HMS) ecosystem. It gives developers a fundamental understanding of the ecosystem and how to leverage kit and tool capabilities to make their apps better. This book is also a quick start guide for kit integration and practical environment setup, detailing the functions and principles behind each kit. By demonstrating how to integrate kits, the authors teach these kits by action: Account Kit, IAP, Push Kit, Location Kit, Map Kit, Site Kit, Safety Detect, and FIDO. Readers are fully introduced to how they can use HMS open capabilities to develop quality apps, acquire users, and monetize their hard work. In addition, the ecosystem background - the business model and value chain that underpin the entire ecosystem as well as its privacy compliance framework - is crucial to operations and illustrated in this book.

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R3,917 Discovery Miles 39 170 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Linux Yourself - Concept and Programming (Hardcover): Sunil K. Singh Linux Yourself - Concept and Programming (Hardcover)
Sunil K. Singh
R4,467 Discovery Miles 44 670 Ships in 12 - 17 working days

Numerous people still believe that learning and acquiring expertise in Linux is not easy, that only a professional can understand how a Linux system works. Nowadays, Linux has gained much popularity both at home and at the workplace. Linux Yourself: Concept and Programming aims to help and guide people of all ages by offering a deep insight into the concept of Linux, its usage, programming, administration, and several other connected topics in an easy approach. This book can also be used as a textbook for undergraduate/postgraduate engineering students and others who have a passion to gain expertise in the field of computer science/information technology as a Linux developer or administrator. The word "Yourself" in the title refers to the fact that the content of this book is designed to give a good foundation to understand the Linux concept and to guide yourself as a good Linux professional in various platforms. There are no prerequisites to understand the contents from this book, and a person with basic knowledge of C programming language will be able to grasp the concept with ease. With this mindset, all the topics are presented in such a way that it should be simple, clear, and straightforward with many examples and figures. Linux is distinguished by its own power and flexibility, along with open-source accessibility and community as compared to other operating systems, such as Windows and macOS. It is the author's sincere view that readers of all levels will find this book worthwhile and will be able to learn or sharpen their skills. KEY FEATURES Provides a deep conceptual learning and expertise in programming skill for any user about Linux, UNIX, and their features. Elaborates GUI and CUI including Linux commands, various shells, and the vi editor Details file management and file systems to understand Linux system architecture easily Promotes hands-on practices of regular expressions and advanced filters, such as sed and awk through many helpful examples Describes an insight view of shell scripting, process, thread, system calls, signal, inter-process communication, X Window System, and many more aspects to understand the system programming in the Linux environment Gives a detailed description of Linux administration by elaborating LILO, GRUB, RPM-based package, and program installation and compilation that can be very helpful in managing the Linux system in a very efficient way Reports some famous Linux distributions to understand the similarity among all popular available Linux and other features as case studies

Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover): Chinmay Chakraborty, Sree Ranjani... Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover)
Chinmay Chakraborty, Sree Ranjani Rajendran, Muhammad Habibur Rehman
R4,516 Discovery Miles 45 160 Ships in 12 - 17 working days

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

TI-83 Plus Calculator (Fold-out book or chart): BarCharts Inc TI-83 Plus Calculator (Fold-out book or chart)
BarCharts Inc
R219 Discovery Miles 2 190 Ships in 12 - 17 working days

You ve just purchased a TI-83 Plus calculator to assist in performing different types of mathematical equations now, how can you get the most out of it? You ll find the answer to this question with our comprehensive, 3-panel guide that shows in great detail what exactly the TI-83 Plus can do. Function key and mode descriptions, as well as problem-solving examples, are included within a color-coded format for easy reference.

"

Opportunistic Networks - Fundamentals, Applications and Emerging Trends (Hardcover): Anshul Verma, Pradeepika Verma, Sanjay... Opportunistic Networks - Fundamentals, Applications and Emerging Trends (Hardcover)
Anshul Verma, Pradeepika Verma, Sanjay Kumar Dhurandher, Isaac Woungang
R3,639 Discovery Miles 36 390 Ships in 12 - 17 working days

The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks. The book follows a theoretical approach to describe fundamentals to beginners and incorporates a practical approach depicting the implementation of real-life applications to intermediate and advanced readers. This book is beneficial for academicians, researchers, developers, and engineers who work in or are interested in the fields related to opportunistic networks, delay tolerant networks, and intermittently connected ad hoc networks. This book also serves as a reference book for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Edge Computing and Capability-Oriented Architecture (Hardcover): Haishi Bai, Boris Scholl Edge Computing and Capability-Oriented Architecture (Hardcover)
Haishi Bai, Boris Scholl
R2,440 Discovery Miles 24 400 Ships in 12 - 17 working days

Fueled by ubiquitous computing ambitions, the edge is at the center of confluence of many emergent technological trends such as hardware-rooted trust and code integrity, 5G, data privacy and sovereignty, blockchains and distributed ledgers, ubiquitous sensors and drones, autonomous systems and real-time stream processing. Hardware and software pattern maturity have reached a tipping point so that scenarios like smart homes, smart factories, smart buildings, smart cities, smart grids, smart cars, smart highways are in reach of becoming a reality. While there is a great desire to bring born-in-the-cloud patterns and technologies such as zero-downtime software and hardware updates/upgrades to the edge, developers and operators alike face a unique set of challenges due to environmental differences such as resource constraints, network availability and heterogeneity of the environment. The first part of the book discusses various edge computing patterns which the authors have observed, and the reasons why these observations have led them to believe that there is a need for a new architectural paradigm for the new problem domain. Edge computing is examined from the app designer and architect's perspectives. When they design for edge computing, they need a new design language that can help them to express how capabilities are discovered, delivered and consumed, and how to leverage these capabilities regardless of location and network connectivity. Capability-Oriented Architecture is designed to provide a framework for all of these. This book is for everyone who is interested in understanding what ubiquitous and edge computing means, why it is growing in importance and its opportunities to you as a technologist or decision maker. The book covers the broad spectrum of edge environments, their challenges and how you can address them as a developer or an operator. The book concludes with an introduction to a new architectural paradigm called capability-based architecture, which takes into consideration the capabilities provided by an edge environment. .

Confident Coding - Learn How to Code and Master the Essentials (Paperback, 3rd Revised edition): Rob Percival, Darren Woods Confident Coding - Learn How to Code and Master the Essentials (Paperback, 3rd Revised edition)
Rob Percival, Darren Woods
R422 R386 Discovery Miles 3 860 Save R36 (9%) Ships in 12 - 17 working days

Coding is one of the most in-demand skills in the job market. Whether you're a recent graduate or a professional, Confident Coding offers the career insights and technical knowledge you need for success. A unique combination of technical insights and fascinating career guidance, this book highlights the importance of coding, whatever your professional profile. For entrepreneurs, being able to create your own website or app can grant you valuable freedom and revolutionize your business. For aspiring developers, this book will give you the building blocks to embark on your career path. This new and improved third edition of the award-winning book gives you a step-by-step learning guide to HTML, CSS, JavaScript, Python, building iPhone and Android apps and debugging. Confident Coding is the essential guide to mastering the fundamentals of coding. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.

Artificial Intelligence for Business Optimization - Research and Applications (Hardcover): Bhuvan Unhelkar, Tad Gonsalves Artificial Intelligence for Business Optimization - Research and Applications (Hardcover)
Bhuvan Unhelkar, Tad Gonsalves
R2,526 Discovery Miles 25 260 Ships in 12 - 17 working days

This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit. By considering business strategies, business process modeling, quality assurance, cybersecurity, governance and big data and focusing on functions, processes, and people's behaviors it helps businesses take a truly holistic approach to business optimization. It contains practical examples that make it easy to understand the concepts and apply them. It is written for practitioners (consultants, senior executives, decision-makers) dealing with real-life business problems on a daily basis, who are keen to develop systematic strategies for the application of AI/ML/BD technologies to business automation and optimization, as well as researchers who want to explore the industrial applications of AI and higher-level students.

Engineering Production-Grade Shiny Apps (Hardcover): Colin Fay, Sebastien Rochette, Vincent Guyader, Cervan Girard Engineering Production-Grade Shiny Apps (Hardcover)
Colin Fay, Sebastien Rochette, Vincent Guyader, Cervan Girard
R4,088 Discovery Miles 40 880 Ships in 12 - 17 working days

Focused on practical matters: this book will not cover Shiny concepts, but practical tools and methodologies to use for production. Based on experience: this book will be a formalization of several years of experience building Shiny applications. Original content: this book will present new methodology and tooling, not just do a review of what already exists.

Internet of Things - Energy, Industry, and Healthcare (Hardcover): Arun Kumar Rana, Ayodeji Olalekan Salau, Sharad Sharma,... Internet of Things - Energy, Industry, and Healthcare (Hardcover)
Arun Kumar Rana, Ayodeji Olalekan Salau, Sharad Sharma, Shubham Tayal, Swati Gupta
R3,337 Discovery Miles 33 370 Ships in 12 - 17 working days

Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform

Windows Internals, Part 2 (Paperback, 7th edition): Andrea Allievi, Alex Ionescu, Mark Russinovich, David Solomon Windows Internals, Part 2 (Paperback, 7th edition)
Andrea Allievi, Alex Ionescu, Mark Russinovich, David Solomon
R1,010 Discovery Miles 10 100 Ships in 12 - 17 working days

The definitive guide to modern Windows internals: new coverage of virtualization, file systems, boot, security, and more. For advanced computing professionals, this is the definitive up-to-date guide to how Windows core components behave "under the hood." Using it, experienced developers can build more powerful and scalable software, administrators can debug complex system and performance problems, and security researchers can harden their systems. This Seventh Edition is fully updated through the May 2021 (21H1/2104) updates to Windows 10 and Windows Server (2022, 2019, and 2016). It adds extensive content on Hyper-V, plus fully rewritten chapters on the boot process, new storage technologies, and Windows system and management mechanisms. As always, it delivers unparalleled insight based on insider access to Microsoft source code, with hands-on experiments using the latest debugging tools to show you Windows' internal behaviors firsthand. With Windows 11 introducing new user interface design elements that build upon the same core technologies as Windows 10, readers will be well-prepared for this new chapter of computing. Leading Windows insiders help you: * Discover system mechanisms for serving device drivers and applications, including ALPC, Object Manager, synchronization, WNF, WoW64, and the processor execution model * Explore underlying hardware architecture, including trap processing, segmentation, and side channel vulnerabilities * Understand Windows virtualization, and how virtualization-based security (VBS) protects against OS vulnerabilities * Delve into key management and configuration mechanisms, including the Registry, Windows services, WMI, and Task Scheduling * Explore diagnostic services such as Event Tracing for Windows (ETW) and DTrace * Learn how the cache manager and file system drivers interact to provide reliable support for files, directories, and disks, including on Persistent Memory (NVDIMM) DAX devices. * Understand NTFS, ReFS, and other Windows file systems * Review Windows startup/shutdown operations, and OS components involved in boot flow * Analyze UEFI-based Secure Boot, Measured Boot, and Secure Launch About This Book * For experienced programmers, architects, software quality and performance specialists, administrators, security practitioners, and support professionals * Assumes you are a Windows power user

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,912 Discovery Miles 19 120 Ships in 9 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Practitioner's Guide to Business Impact Analysis (Paperback): Priti Sikdar Practitioner's Guide to Business Impact Analysis (Paperback)
Priti Sikdar
R1,277 Discovery Miles 12 770 Ships in 12 - 17 working days

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists and flow diagrams that give the roadmap to collect, collate and analyze data, and give enterprise management the entire mapping for controls that comprehensively covers all compliance that the enterprise is subject to have. The book helps professionals build a control framework tailored for an enterprise that covers best practices and relevant standards applicable to the enterprise. Presents a practical approach to assessing security, performance and business continuity needs of the enterprise Helps readers understand common objectives for audit, compliance, internal/external audit and assurance. Demonstrates how to build a customized controls framework that fulfills common audit criteria, business resilience needs and internal monitoring for effectiveness of controls Presents an Integrated Audit approach to fulfill all compliance requirements

Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Paperback): James Bone Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Paperback)
James Bone
R1,233 Discovery Miles 12 330 Ships in 12 - 17 working days

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

Smart Sensor Networks Using AI for Industry 4.0 - Applications and New Opportunities (Hardcover): Soumya Ranjan Nayak, Biswa... Smart Sensor Networks Using AI for Industry 4.0 - Applications and New Opportunities (Hardcover)
Soumya Ranjan Nayak, Biswa Mohan Sahoo, Muthukumaran Malarvel, Jibitesh Mishra
R3,335 Discovery Miles 33 350 Ships in 12 - 17 working days

Provides a structured look, at the unique characteristic for smart sensor networks to resolving the issues of many real-world applications in a broad range of areas such as Smart Healthcare, Engineering, Scientific Research, Social Media, Industrial Automation and more Offers a systematic look at the unique characteristics of AI based wireless sensor networks through their usage in a broad range of areas Delivers recent trends and core concepts in both analytics and application in smart sensor networks using AI Explores the development and application of AI and evolutionary computing as applied to wireless sensor networks Focuses on stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation result and an application-oriented approach.

Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Hardcover): Stephen... Blockchain Applied - Practical Technology and Use Cases of Enterprise Blockchain for the Real World (Hardcover)
Stephen Ashurst, Stefano Tempesta
R4,073 Discovery Miles 40 730 Ships in 12 - 17 working days

Blockchain is the popular name given to the exciting, evolving world of distributed ledger technology (DLT). Blockchains offer equitable and secure access to data, as well as transparency and immutability. Organisations can decide to use blockchain to upgrade whatever ledgers they are currently deploying (for example, relational databases, spreadsheets and cumbersome operating models) for their data and technology stack in terms of books and records, transactions, storage, production services and in many other areas. This book describes the applied use of blockchain technology in the enterprise world. Written by two expert practitioners in the field, the book is in two main parts: (1) an introduction to the history of, and a critical context explainer about, the emergence of blockchain written in natural language and providing a tour of the features, functionality and challenges of blockchain and DLT; and (2) a series of six applied organisational use cases in (i) trade finance, (ii) healthcare, (iii) retail savings & investments, (iv) real estate, (v) central bank digital currencies (CBDC) and (vi) fund management that offer the reader a straightforward, easy-to-read comparison between 'old world' technology (such as platforms, people and processes) versus what blockchain ledgers offer to enterprises and organisations in terms of improved efficiency, performance, security and access to business data. Blockchain is sometimes tainted by association to Bitcoin, Onecoin and others. But as cryptocurrencies and stock markets continue to rise and fall with volatility and the world economy emerges changed by coronavirus, working from home and the threat of inflation, many enterprises, organisations and governments are looking again at the powerful features of blockchain and wondering how DLT may help them adapt. This book is an ideal introduction to the practical and applied nature of blockchain and DLT solutions for business executives, business students, managers, C-suite senior leaders, software architects and policy makers and sets out, clearly and professionally, the benefits and challenges of the actual business applications of blockchain.

Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics (Hardcover): R. Sujatha, S. L. Aarthy, R.... Integrating Deep Learning Algorithms to Overcome Challenges in Big Data Analytics (Hardcover)
R. Sujatha, S. L. Aarthy, R. Vettriselvan
R3,182 Discovery Miles 31 820 Ships in 12 - 17 working days

Provides insight into the skill set that requires leveraging strength to move further to act as a good data analyst Discusses how big data along with deep learning holds the potential to significantly increase data understanding and in turn, helps to make decisions Covers the numerous potential applications in healthcare, education, communications, media, and the entertainment industry Offers innovative platforms for integrating big data and deep learning Presents issues related to adequate data storage, sematic indexing, data tagging, and fast information retrieval from big data

The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R1,117 Discovery Miles 11 170 Ships in 12 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

Big Data Analytics - Harnessing Data for New Business Models (Hardcover): Soraya Sedkaoui, Mounia Khelfaoui, Nadjat Kadi Big Data Analytics - Harnessing Data for New Business Models (Hardcover)
Soraya Sedkaoui, Mounia Khelfaoui, Nadjat Kadi
R4,161 Discovery Miles 41 610 Ships in 12 - 17 working days

This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business. It examines the role of analytics tools and methods of using big data in strengthening businesses to meet today's information challenges and shows how businesses can adapt big data for effective businesses practices. This volume shows how big data and the use of data analytics is being effectively adopted more frequently, especially in companies that are looking for new methods to develop smarter capabilities and tackle challenges in dynamic processes. Many illustrative case studies are presented that highlight how companies in every sector are now focusing on harnessing data to create a new way of doing business.

Transformation and Your New EHR - The Communications and Change Leadership Playbook for Implementing Electronic Health Records... Transformation and Your New EHR - The Communications and Change Leadership Playbook for Implementing Electronic Health Records (Paperback)
Dennis R. Delisle, Andy McLamb, Samantha Inch
R1,025 Discovery Miles 10 250 Ships in 12 - 17 working days

Transformation and Your New EHR offers a robust communication and change leadership approach to support electronic health record (EHR) implementations and transformation journeys. This book highlights the approach and philosophy of communication, change leadership, and systems and process design, giving readers a practical view into the successes and failures that can be experienced throughout the evolution of an EHR implementation.

A Practical Introduction to Enterprise Network and Security Management (Hardcover, 2nd edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Hardcover, 2nd edition)
Bongsik Shin
R3,069 Discovery Miles 30 690 Ships in 12 - 17 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective. Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,036 Discovery Miles 10 360
macOS Big Sur For Dummies
B LeVitus Paperback R560 Discovery Miles 5 600
Mike Meyers' CompTIA A+ Guide to 801…
Mike Meyers Paperback R1,279 Discovery Miles 12 790
Windows 11 for Seniors in easy steps
Michael Price Paperback R334 Discovery Miles 3 340
Acquiring Card Payments
Ilya Dubinsky Paperback R1,334 Discovery Miles 13 340
Linux Bible, Tenth Edition
C Negus Paperback R1,165 Discovery Miles 11 650
Laptops For Dummies, 7th Edition
D. Gookin Paperback R799 R571 Discovery Miles 5 710
Beginning Ubuntu LTS Server…
Sander van Vugt Paperback R1,408 R1,114 Discovery Miles 11 140
iPhone For Seniors For Dummies 2022…
D Spivey Paperback R733 R533 Discovery Miles 5 330
Intelligent IT Outsourcing
Sara Cullen, Leslie Willcocks Paperback R1,771 Discovery Miles 17 710

 

Partners