0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (45)
  • R100 - R250 (3,009)
  • R250 - R500 (13,333)
  • R500+ (107,430)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT

Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover): Chris Bronk Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover)
Chris Bronk
R2,315 Discovery Miles 23 150 Ships in 18 - 22 working days

This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed

Experience-Based Human-Computer Interactions - Emerging Research and Opportunities (Hardcover): Petr Sosnin Experience-Based Human-Computer Interactions - Emerging Research and Opportunities (Hardcover)
Petr Sosnin
R4,086 Discovery Miles 40 860 Ships in 18 - 22 working days

Human computer interaction is constantly evolving in many areas and facets of modern society. Analyzing these interactions can provide a more balanced understanding of these technological advances as they pertain to people's lives. Experience-Based Human-Computer Interactions: Emerging Research and Opportunities is a pivotal reference source that provides in-depth discussions on the progression and contemporary applications of human computer interaction. Highlighting relevant topic areas such as semantic support, software intensive systems, ontology applications, and conceptual objects, this publication is ideal for engineers, academicians, students, and researchers that would like to attain more information on recent advances being made to bridge the gap between human and computer interactions.

Control of Complex Systems - Theory and Applications (Hardcover): Kyriakos Vamvoudakis, Sarangapani Jagannathan Control of Complex Systems - Theory and Applications (Hardcover)
Kyriakos Vamvoudakis, Sarangapani Jagannathan
R3,828 R3,572 Discovery Miles 35 720 Save R256 (7%) Ships in 10 - 15 working days

In the era of cyber-physical systems, the area of control of complex systems has grown to be one of the hardest in terms of algorithmic design techniques and analytical tools. The 23 chapters, written by international specialists in the field, cover a variety of interests within the broader field of learning, adaptation, optimization and networked control. The editors have grouped these into the following 5 sections: "Introduction and Background on Control Theory", "Adaptive Control and Neuroscience", "Adaptive Learning Algorithms", "Cyber-Physical Systems and Cooperative Control", "Applications". The diversity of the research presented gives the reader a unique opportunity to explore a comprehensive overview of a field of great interest to control and system theorists. This book is intended for researchers and control engineers in machine learning, adaptive control, optimization and automatic control systems, including Electrical Engineers, Computer Science Engineers, Mechanical Engineers, Aerospace/Automotive Engineers, and Industrial Engineers. It could be used as a text or reference for advanced courses in complex control systems. * Collection of chapters from several well-known professors and researchers that will showcase their recent work * Presents different state-of-the-art control approaches and theory for complex systems * Gives algorithms that take into consideration the presence of modelling uncertainties, the unavailability of the model, the possibility of cooperative/non-cooperative goals and malicious attacks compromising the security of networked teams * Real system examples and figures throughout, make ideas concrete

Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition)
Jason Andress, Ryan Linn
R1,040 Discovery Miles 10 400 Ships in 10 - 15 working days

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

Cyber-Physical Systems - Foundations, Principles and Applications (Paperback): Houbing Song, Danda B. Rawat, Sabina Jeschke,... Cyber-Physical Systems - Foundations, Principles and Applications (Paperback)
Houbing Song, Danda B. Rawat, Sabina Jeschke, Christian Brecher
R2,507 R2,368 Discovery Miles 23 680 Save R139 (6%) Ships in 10 - 15 working days

Cyber-Physical Systems: Foundations, Principles and Applications explores the core system science perspective needed to design and build complex cyber-physical systems. Using Systems Science's underlying theories, such as probability theory, decision theory, game theory, organizational sociology, behavioral economics, and cognitive psychology, the book addresses foundational issues central across CPS applications, including System Design -- How to design CPS to be safe, secure, and resilient in rapidly evolving environments, System Verification -- How to develop effective metrics and methods to verify and certify large and complex CPS, Real-time Control and Adaptation -- How to achieve real-time dynamic control and behavior adaptation in a diverse environments, such as clouds and in network-challenged spaces, Manufacturing -- How to harness communication, computation, and control for developing new products, reducing product concepts to realizable designs, and producing integrated software-hardware systems at a pace far exceeding today's timeline. The book is part of the Intelligent Data-Centric Systems: Sensor-Collected Intelligence series edited by Fatos Xhafa, Technical University of Catalonia. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover)
Information R Management Association
R11,891 Discovery Miles 118 910 Ships in 18 - 22 working days
Trusted Platform Modules - Why, when and how to use them (Hardcover): Ariel Segall Trusted Platform Modules - Why, when and how to use them (Hardcover)
Ariel Segall
R2,849 R2,589 Discovery Miles 25 890 Save R260 (9%) Ships in 18 - 22 working days

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation. This book describes the primary uses for TPMs, and practical considerations such as when TPMs can and should be used, when they shouldn't be, what advantages they provide, and how to actually make use of them, with use cases and worked examples of how to implement these use cases on a real system. Topics covered include when to use a TPM; TPM concepts and functionality; programming introduction; provisioning: getting the TPM ready to use; first steps: TPM keys; machine authentication; data protection; attestation; other TPM features; software and specifications; and troubleshooting. Appendices contain basic cryptographic concepts; command equivalence and requirements charts; and complete code samples.

Wavelets In Soft Computing (Hardcover, Second Edition): Marc Thuillard Wavelets In Soft Computing (Hardcover, Second Edition)
Marc Thuillard
R2,613 Discovery Miles 26 130 Ships in 18 - 22 working days

The comprehensive compendium furnishes a quick and efficient entry point to many multiresolution techniques and facilitates the transition from an idea into a real project. It focuses on methods combining several soft computing techniques (fuzzy logic, neural networks, genetic algorithms) in a multiresolution framework.Illustrated with numerous vivid examples, this useful volume gives the reader the necessary theoretical background to decide which methods suit his/her needs.New materials and applications for multiresolution analysis are added, including notable research topics such as deep learning, graphs, and network analysis.

Day trading Playbook - Intermediate Guide to the Best Intraday Strategies & Setups for profiting on Stocks, Options, Forex and... Day trading Playbook - Intermediate Guide to the Best Intraday Strategies & Setups for profiting on Stocks, Options, Forex and Cryptocurrencies. Build Up a remarkable Passive Income within weeks! (Hardcover)
David Reese
R584 R533 Discovery Miles 5 330 Save R51 (9%) Ships in 18 - 22 working days
Harnessing Social Media as a Knowledge Management Tool (Hardcover): Ritesh Chugh Harnessing Social Media as a Knowledge Management Tool (Hardcover)
Ritesh Chugh
R4,728 Discovery Miles 47 280 Ships in 18 - 22 working days

Knowledge is a valuable resource that must be managed well for any organization to thrive. Proper knowledge management can improve business processes by creating value, yet the available tools meant to aid in the creation, collection, and storage of information have drastically changed since the emergence of social media. By using this collaborative online application for engaging with information, organizations are able to precisely decimate knowledge to the correct audience. Harnessing Social Media as a Knowledge Management Tool addresses the challenges and rewards of the proper use of social media, as well as the key enablers and barriers of its application. This publication endeavors to provide thorough insight into the role of social media in knowledge management from both an organizational and individual perspective. This book elucidates emerging strategies perfect for policy makers, managers, advertisers, academics, students, and organizations who wish to optimize performance.

100 Secret Social Media Marketing Tricks for 2019 - The Best Strategies & Tips for Digital Marketing, YouTube and Instagram... 100 Secret Social Media Marketing Tricks for 2019 - The Best Strategies & Tips for Digital Marketing, YouTube and Instagram Used by the Top Influencers and Personal Brands (Beginners Guide) (Hardcover)
Leslie Spanier
R707 Discovery Miles 7 070 Ships in 18 - 22 working days
SQL Programming: Java Script and Coding Programming Guide: Learn in A Day! (Hardcover): Os Swift SQL Programming: Java Script and Coding Programming Guide: Learn in A Day! (Hardcover)
Os Swift
R792 Discovery Miles 7 920 Ships in 18 - 22 working days

Would You Like to Learn the SQL Programming Language In A Day? What is SQL? How can it benefit you? What will it take for you to learn this language? When you purchase SQL Programming: Programing Language for Beginners - Learn in a Day!, you can quickly learn the basics of this essential skill! These fun and easy tips transform the dreaded chore of learning a new programming language into a fun hobby. You'll be proud to show off your new abilities to your friends, coworkers, and family! How do you get started with SQL? What will you learn? SQL Programming: Programing Language for Beginners - Learn in a Day! helps you understand: Table Basics The SELECT Statement Using Clauses Combining Conditions and Boolean Operators The Importance of Table Joins Lots more! Purchase SQL Programming: Programing Language for Beginners - Learn in a Day! now, and change your computer programming life forever!

Research Anthology on Advancements in Cybersecurity Education (Hardcover): Information Resources Management Association Research Anthology on Advancements in Cybersecurity Education (Hardcover)
Information Resources Management Association
R10,591 Discovery Miles 105 910 Ships in 18 - 22 working days

Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. From banking to medical records to e-commerce, sensitive data has never before been at such a high risk of misuse. As such, organizations now have a greater responsibility than ever to ensure that their stakeholder data is secured, leading to the increased need for cybersecurity specialists and the development of more secure software and systems. To avoid issues such as hacking and create a safer online space, cybersecurity education is vital and not only for those seeking to make a career out of cybersecurity, but also for the general public who must become more aware of the information they are sharing and how they are using it. It is crucial people learn about cybersecurity in a comprehensive and accessible way in order to use the skills to better protect all data. The Research Anthology on Advancements in Cybersecurity Education discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data. Providing information on a range of topics from cybersecurity education requirements, cyberspace security talents training systems, and insider threats, it is ideal for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.

Annual Reports in Computational Chemistry, Volume 12 (Hardcover): David A Dixon Annual Reports in Computational Chemistry, Volume 12 (Hardcover)
David A Dixon
R5,523 Discovery Miles 55 230 Ships in 10 - 15 working days

Annual Reports in Computational Chemistry provides timely and critical reviews of important topics in computational chemistry as applied to all chemical disciplines. Topics covered include quantum chemistry, molecular mechanics, force fields, chemical education, and applications in academic and industrial settings. Focusing on the most recent literature and advances in the field, each article covers a specific topic of importance to computational chemists.

Tank Girl: Colour Classics Trilogy (1988-1995) Boxed Set (Paperback): Jamie Hewlett, Alan Martin Tank Girl: Colour Classics Trilogy (1988-1995) Boxed Set (Paperback)
Jamie Hewlett, Alan Martin
R900 Discovery Miles 9 000 Ships in 10 - 15 working days

The definitive anthology of Tank Girl, collecting the classic, newly colored stories from original creators Alan Martin and Jamie Hewlett! Includes three exclusive art! All three volumes of the cult-classic Tank Girl comics (1988-1995) from legendary creators Alan Martin and Jamie Hewlett (Gorillaz). Dive into the twisted and chaotic world of Tank Girl, Jet Girl, Sub Girl and Booga, and experience the original stories that captured the hearts of readers everywhere, then shot them to oblivion (by accident of course)! With all new colouring, this is the complete Tank Girl collection you won't want to miss.

Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover): William Vance Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover)
William Vance
R576 R530 Discovery Miles 5 300 Save R46 (8%) Ships in 18 - 22 working days
Python Machine Learning - A Practical Beginner's Guide for Understanding Machine Learning, Deep Learning and Neural... Python Machine Learning - A Practical Beginner's Guide for Understanding Machine Learning, Deep Learning and Neural Networks with Python, Scikit-Learn, Tensorflow and Keras (Hardcover)
Brandon Railey
R685 R614 Discovery Miles 6 140 Save R71 (10%) Ships in 18 - 22 working days
Arduino - The ultimate Arduino guide for beginners, including Arduino programming, Arduino cookbook, tips, tricks, and more!... Arduino - The ultimate Arduino guide for beginners, including Arduino programming, Arduino cookbook, tips, tricks, and more! (Hardcover)
Craig Newport
R549 R504 Discovery Miles 5 040 Save R45 (8%) Ships in 18 - 22 working days
Encyclopedia of E-Commerce Development, Implementation, and Management, VOL 3 (Hardcover): in Lee Encyclopedia of E-Commerce Development, Implementation, and Management, VOL 3 (Hardcover)
in Lee
R22,948 Discovery Miles 229 480 Ships in 18 - 22 working days
Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,520 R2,325 Discovery Miles 23 250 Save R195 (8%) Ships in 10 - 15 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Channel Coding: Theory, Algorithms, and Applications - Academic Press Library in Mobile and Wireless Communications... Channel Coding: Theory, Algorithms, and Applications - Academic Press Library in Mobile and Wireless Communications (Paperback)
David Declercq, Marc Fossorier, Ezio Biglieri
R3,340 R3,126 Discovery Miles 31 260 Save R214 (6%) Ships in 10 - 15 working days

This book gives a review of the principles, methods and techniques of important and emerging research topics and technologies in Channel Coding, including theory, algorithms, and applications. Edited by leading people in the field who, through their reputation, have been able to commission experts to write on a particular topic. With this reference source you will: Quickly grasp a new area of research Understand the underlying principles of a topic and its applications Ascertain how a topic relates to other areas and learn of the research issues yet to be resolved

Options Trading for Beginners - A Step-By-Step Crash Course To Make Money and Create a Passive Income by Options Trading... Options Trading for Beginners - A Step-By-Step Crash Course To Make Money and Create a Passive Income by Options Trading (Hardcover)
Mattew Von Der Lyer
R680 R609 Discovery Miles 6 090 Save R71 (10%) Ships in 18 - 22 working days
E-Commerce: Business Models and Service Management (Hardcover): Anthony Rocus E-Commerce: Business Models and Service Management (Hardcover)
Anthony Rocus
R3,282 R2,972 Discovery Miles 29 720 Save R310 (9%) Ships in 18 - 22 working days
Smart Technologies - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Smart Technologies - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R8,448 Discovery Miles 84 480 Ships in 18 - 22 working days

Ongoing advancements in modern technology have led to significant developments with smart technologies. With the numerous applications available, it becomes imperative to conduct research and make further progress in this field. Smart Technologies: Breakthroughs in Research and Practice provides comprehensive and interdisciplinary research on the most emerging areas of information science and technology. Including innovative studies on image and speech recognition, human-computer interface, and wireless technologies, this multi-volume book is an ideal source for researchers, academicians, practitioners, and students interested in advanced technological applications and developments.

Computer-aided Technologies - Applications in Engineering and Medicine (Hardcover): Razvan Udroiu Computer-aided Technologies - Applications in Engineering and Medicine (Hardcover)
Razvan Udroiu
R3,091 Discovery Miles 30 910 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
King Tony Spanner Speed Open End (8mm)
Ethical Data Mining Applications for…
Hakikur Rahman, Isabel Ramos Hardcover R4,943 Discovery Miles 49 430
Micro-Tec Spanner Combination (24mm)
Micro-Tec Spanner Offset Combination (2…
Micro-Tec Spanner Flex Socket (13mm)
Micro-Tec Spanner Combination (2 Pack…
Data Science - The Ultimate Guide to…
Herbert Jones Hardcover R698 R627 Discovery Miles 6 270
Micro-Tec Spanner Combination (21mm)
Big Data Security
Shibakali Gupta, Indradip Banerjee, … Hardcover R3,625 Discovery Miles 36 250
Slogging Spanner 70mm Ring End Crv

 

Partners