![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Academic & Education > Varsity Textbooks > Computer Science
GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional.
To survive in globally competitive markets manufacturers are going to have to develop a system for mass customization of products. This valuable resource is designed to prepare readers for the future by training them in the latest technologies and processes in the areas of design, manufacturing, and tools of integration.
Master the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.
Now in its third edition, Principles of Business Information Systems has been fully updated with new cases, new questions and assignments and the latest technologies, whilst also retaining its comprehensive coverage of Information Systems issues. This new international edition also boasts a wealth of real world examples from a broad range of countries and updated coverage of IT and technological issues, making it perfect for courses that prepare students for the modern corporate world.
Introduce your students to the latest advancements that Microsoft (R) Office and Access (R) have to offer with MICROSOFT (R) OFFICE 365 & ACCESS (R) 2019: COMPREHENSIVE -- new to the acclaimed Shelly Cashman Series (R). MICROSOFT (R) OFFICE 365 & ACCESS (R) 2019: COMPREHENSIVE continues the series' strong history of innovation with a hallmark learning approach enhanced to address the varied learning styles of today's students. A trademark step-by-step, screen-by-screen approach encourages students to expand their understanding of the software through experimentation, critical thought, and personalization. This new edition and accompanying resources are designed to engage readers and improve retention while also engaging them in real-world scenarios to reinforce critical skills to make them successful in their educational and professional careers. In addition, MindTap and updated SAM (Skills Assessment Manager) online resources are available to guide additional study and ensure successful results.
Discover the latest advantages that Microsoft (R) Access (R) has to offer with this new book in the next generation of the Shelly Cashman Series (R). For three decades, the Shelly Cashman Series (R) has effectively introduced essential computer skills to millions of students like you. ENHANCED MICROSOFT ACCESS 2013: COMPREHENSIVE continues the history of innovation with new features that accommodate your learning style. Specially refined learning tools help improve your retention and prepare you for future success while new labs integrate cloud and web technologies with MS Access. This book's trademark step-by-step, screen-by-screen approach now guides you in expanding your understanding of Microsoft Access 2013 through experimentation, critical thought, and personalization. Trust ENHANCED MICROSOFT ACCESS 2013: COMPREHENSIVE to help you succeed with today's most effective educational approach.
For courses in computer science and software engineering This new 10th edition of Sommerville introduces students to software engineering by focusing on the proven processes and techniques fundamental to the creation of reliable software systems. Ian Sommerville, drawing on experience in system dependability and systems engineering, guides the reader through the most widely used agile methods and plan-based approaches. The text strives to teach the engineers of tomorrow how to create software that will make our world a more convenient, safer, and enjoyable place to live.
Appropriate for courses in Knowledge Management. Thoroughly revised to reflect today's latest tools, technologies, and best practices, this hands-on guide walks students through the development of a state-of-the-art enterprise Knowledge Management Platform that can leverage a company's existing investments in intranets, data warehousing, data mining, groupware, and other technologies. It offers a complete roadmap for building KM systems incrementally-with each step delivering new business value, and seamlessly building on the work that preceded it. Students gain hands-on experience by through their own KM projects.
Simulation with Arena provides a comprehensive treatment of simulation using industry-standard Arena software. The text starts by having the reader develop simple high-level models, and then progresses to advanced modeling and analysis. Statistical design and analysis of simulation experiments is integrated with the modeling chapters, reflecting the importance of mathematical modeling of these activities. An informal, tutorial writing style is used to aid the beginner in fully understanding the ideas and topics presented. The academic version of Arena and example files are available through the book's website. McGraw-Hill is proud to offer Connect with the sixth edition of Kelton's, Simulation with Arena. This innovative and powerful system helps your students learn more efficiently and gives you the ability to customize your homework problems simply and easily. Track individual student performance - by question, assignment, or in relation to the class overall with detailed grade reports. ConnectPlus provides students with all the advantages of Connect, plus 24/7 access to an eBook. Kelton's Simulation with Arena, sixth edition, includes the power of McGraw-Hill's LearnSmart a proven adaptive learning system that helps students learn faster, study more efficiently, and retain more knowledge through a series of adaptive questions. This innovative study tool pinpoints concepts the student does not understand and maps out a personalized plan for success.
This Cengage Technology Edition is the result of an innovative and collaborative development process. The textbook retains the hallmark approach of this respected text, whilst presenting the content in a print and digital hybrid that has been tailored to meet the rapidly developing demands of today's lecturers and students. This blended solution offers a streamlined textbook for greater accessibility and convenience, complemented by a bolstered online presence, for a truly multi-faceted learning experience. Now in its sixth edition, Introduction to Systems Analysis and Design: An Agile, Iterative Approach continues to be a market leading text in its field, teaching both traditional (structured) and object-oriented (OO) approaches to systems analysis and design. The text provides a thorough treatment of such topics as use cases, object-oriented modeling, comprehensive project management, the unified modeling language, and Agile techniques. This new edition uses an innovative approach to teaching systems analysis and design, taking advantage of the new teaching tools and techniques that are now available.
Based on the Association for Computing Imagery model curriculum guidelines, Foundations of Computer Science gives students a bird's eye view of Computer Science. This easy-to-read and easy-to-navigate text covers all the fundamentals of computer science required for first year undergraduates embarking on a computing degree.
We are excited to announce the publication of the ground-breaking Discovering Computers: Fundamentals Edition. This book is the Shelly Cashman Series? answer to the many requests we have received from instructors and students for a textbook that provides a succinct, yet thorough, introduction to computers. Discovering Computers: Fundamentals Edition covers the same breadth of topics as our well-known Discovering Computers 2005: Complete, but the depth of coverage focuses on the basic knowledge required to be computer literate in today's digital world. This text is perfect for a short course on computer concepts, or a full semester course that also teaches applications or programming.
Simple Program Design: A Step by Step Approach, Fifth Edition is written for programmers who want to develop good programming skills for solving common business problems. The fifth edition has been thoroughly revised in keeping with modern program design techniques. The easy-to-follow instructional style has been retained along with the language-independent approach to program design. Stressing structured programming and modular design, pseudocode is used as the major program design technique.
"Universal Usability" is the concept of designing computer interfaces that are easy for all users to utilize. It is a concept which many decry as elusive, impossible, or impractical, but this book, which addresses usability issues for a number of diverse user groups, proves that there is no problem in interface design that cannot be solved, or at least improved upon. Individuals with cognitive, motor, and perceptual impairments, as well as older, younger, and economically disadvantaged users, face a variety of complex challenges when interacting with computers. However, with user involvement, good design practice, and thorough testing, computer interfaces can be successfully developed for any user population. This book, featuring key chapters by Human-Computer Interaction luminaries such as Jonathan Lazar, Ron Baecker, Allison Druin, Ben Shneiderman, Brad Myers and Jenny Preece, examines innovative and groundbreaking research and practice, and provides a practical overview of a number of successful projects which have addressed a need for these specific user populations. Chapters in this book address topics including age diversity, economic diversity, language diversity, visual impairment, and spinal cord injuries. Several of these trailblazing projects in the book are amongst the first to examine usability issues for users with Down Syndrome, users with Amnesia, users with Autism Spectrum Disorders, and users with Alzheimer's Disease, and coverage extends to projects where multiple categories of needs are addressed. These chapters represent real-world projects, being carried out on different continents. The authors of the chapters also represent diversity--interface researchers and software developers in university, industrial, and government settings. In the practical spirit of the book, chapter authors provide guidelines and suggestions for those attempting similar projects, as well as implications for different stakeholders such as policymakers, researchers, and designers. Ideal for students of HCI and User Interface Design, and essential reading for usability practitioners, this fascinating collection of real-world projects demonstrates that computer interfaces can truly be designed to meet the needs of any category of user.
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.
TEACHERS DISCOVERING COMPUTERS: INTEGRATING TECHNOLOGY IN A CHANGING WORLD, EIGHTH EDITION introduces future educators to technology and digital media in order to help them successfully teach the current generation of digital students.
Prepare for Microsoft Exam 70-480-and help demonstrate your real-world mastery of programming with HTML5, JavaScript, and CSS3. Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level. Focus on the expertise measured by these objectives: Implement and manipulate document structures and objects Implement program flow Access and secure data Use CSS3 in applications This Microsoft Exam Ref: Organizes its coverage by exam objectives. Features strategic, what-if scenarios to challenge you.
Discover an expert blend of the programming principles and concepts and hands-on coding skills you need to create a strong professional foundation as a beginning C# programmer. The latest edition of C# PROGRAMMING: FROM PROBLEM ANALYSIS TO PROGRAM DESIGN from respected author Dr. Barbara Doyle provides a straightforward approach and understandable vocabulary that make it easy for you to grasp new programming concepts without distraction. This edition introduces a variety of fundamental programming concepts, from data types and expressions to arrays and collections, all using the latest version of today’s popular C# language. New programming exercises and engaging, numbered examples throughout this edition reflect the latest updates in Visual Studio® 2015 and C# 6.0, while learning objectives, case studies, and Coding Standards summaries in each chapter give you the knowledge and tools you need to master each key concept.
The TOGAF standard is a framework - a detailed method and a set of supporting tools - for developing an Enterprise Architecture, developed by members of The Open Group Architecture Forum. The TOGAF Standard, Version 9.2 is an update providing additional guidance, correcting errors, introducing structural changes to support the TOGAF Library (an extensive collection of reference material), and removing obsolete content. It may be used freely by any organization wishing to develop an Enterprise Architecture for use within that organization (subject to the Conditions of Use). This book is divided into six parts:
Part I- Introduction
Part II- Architecture Development Method
Part III- ADM Guidelines and Techniques
Part IV- Architecture Content Framework
Part V- Enterprise Continuum and Tools
Part VI- Architecture Capability Framework
Master the technical skills and industry know-how to begin an exciting career installing, configuring, and troubleshooting computer networks with the completely updated NETWORK+ GUIDE TO NETWORKS, 7E. You can prepare for success on CompTIA's Network+ N10-006 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, and troubleshooting. This edition addresses today's latest technology with new features that make essential information easily accessible and help you visualize high-level concepts. New OSI layer icons visually link concepts and the OSI model. New and updated "On the Job" stories, Applying Concepts activities, Hands-On and Case Projects let you explore concepts in more depth. The NETWORK+ GUIDE TO NETWORKS, 7E's emphasis on real-world problem solving provides the tools you need to succeed in any computing environment.
The second edition of Database Principles maintains its engaging writing style and brevity; its unique balance between theory and practice and its wealth of examples throughout the text; inspiring student-friendly learning at its best. The international edition provides a solid and practical foundation for the design, implementation and management of database systems. This foundation is built on the notion that, while databases are very practical things, their successful creation depends on understanding the important concepts that define them. The new edition has been updated with all the latest developments and technologies and incorporates a generous number of localised and motivating business vignettes that tie the concepts to real-life situations. This edition is suitable for a first course in databases at undergraduate level and will also provide essential material for conversion postgraduate courses. Providing comprehensive and practical coverage of core database concepts, it is an ideal text not only for those studying database management systems in the context of computer science, but also those on courses in the areas of information systems and business information technology. This textbook also comes packaged with a fully tailored CourseMate and an Instructor's website will also be available to adopters.
Information communication technology (ICT) has changed the way we access and use information. It has also dramatically increased the amount of information available. The information environment constantly changes, and it requires particular skills to make use of the bewildering flood of information. These skills, collectively referred to as information literacy skills, include the ability to locate, evaluate, and use information effectively. They are important for everyone, but especially for undergraduate students. This book will not only ensure that you, as a student, cope with your studies, but will also enable you to participate in the global economy and keep abreast of the ever-changing environment once you graduate. The book examines the various aspects of information literacy, including finding information in a range of sources and resources, such as a library and the internet; and differentiating between various types of resources such as journals, grey literature, government publications, data bases and the internet. It demonstrates how to search electronic information sources effectively, and evaluate information obtained from the internet. It clarifies what is ethical use of information. Also covered in this book are the essential skills of compiling notes and summaries from sources; reading and writing skills - especially as related to writing assignments; and referencing methods needed for compiling an accurate and complete bibliography. The book includes self-test activities and is an indespensable tool for undergraduates.
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today's newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You'll start by mastering the field's basic terms, principles, and concepts. Next, you'll apply these basics in diverse situations and environments, learning to "think like an attacker" and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you'll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user-web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare-recent attacks and emerging risks Security flaws and risks associated with electronic voting systems |
You may like...
Handbook of Electronic Assistive…
Ladan Najafi, Donna Cowan
Paperback
|