0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (47)
  • R100 - R250 (2,856)
  • R250 - R500 (12,592)
  • R500+ (105,928)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT

AWS Encryption SDK Developer Guide (Hardcover): Documentation Team AWS Encryption SDK Developer Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover): Suyel Namasudra, Hamid Sarbazi-Azad Energy Efficiency in Data Centers and Clouds, Volume 100 (Hardcover)
Suyel Namasudra, Hamid Sarbazi-Azad
R4,212 Discovery Miles 42 120 Ships in 10 - 15 working days

Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover): Michelle F Wright Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships (Hardcover)
Michelle F Wright
R5,380 Discovery Miles 53 800 Ships in 18 - 22 working days

Between adolescence and adulthood, individuals begin to explore themselves mentally and emotionally in an attempt to figure out who they are and where they fit in society. Social technologies in the modern age have ushered in an era where these evolving adolescents must circumvent the negative pressures of online influences while also still trying to learn how to be utterly independent. Recent Advances in Digital Media Impacts on Identity, Sexuality, and Relationships is a collection of critical reference materials that provides imperative research on identity exploration in emerging adults and examines how digital media is used to help explore and develop one's identity. While highlighting topics such as mobile addiction, online intimacy, and cyber aggression, this publication explores a crucial developmental period in the human lifespan and how digital media hinders (or helps) maturing adults navigate life. This book is ideally designed for therapists, psychologists, sociologists, psychiatrists, researchers, educators, academicians, and professionals.

Interview with Jeffery Khoury, Bringing Telemedicine to the People - An Entrepreneur Revolutionizing Telemedicine with the... Interview with Jeffery Khoury, Bringing Telemedicine to the People - An Entrepreneur Revolutionizing Telemedicine with the Doctor Pocket(TM) Application (Hardcover)
Richard G Lowe
R429 R400 Discovery Miles 4 000 Save R29 (7%) Ships in 18 - 22 working days
Artificial Intelligence Methods and Applications in Computer Engineering (Hardcover): Sanaa Kaddoura Artificial Intelligence Methods and Applications in Computer Engineering (Hardcover)
Sanaa Kaddoura
R8,244 Discovery Miles 82 440 Ships in 18 - 22 working days

The development of artificial intelligence (AI) involves the creation of computer systems that can do activities that would ordinarily require human intelligence, such as visual perception, speech recognition, decision making, and language translation. Through increasingly complex programming approaches, it has been transforming and advancing the discipline of computer science. Artificial Intelligence Methods and Applications in Computer Engineering illuminates how today's computer engineers and scientists can use AI in real-world applications. It focuses on a few current and emergent AI applications, allowing a more in-depth discussion of each topic. Covering topics such as biomedical research applications, navigation systems, and search engines, this premier reference source is an excellent resource for computer scientists, computer engineers, IT managers, students and educators of higher education, librarians, researchers, and academicians.

Intelligent Human Computer Interaction - 9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017,... Intelligent Human Computer Interaction - 9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings (Hardcover)
Patrick Horain, Catherine Achard, Malik Mallem
R1,355 Discovery Miles 13 550 Ships in 18 - 22 working days
Intermediate Excel (Hardcover): M. L. Humphrey Intermediate Excel (Hardcover)
M. L. Humphrey
R556 Discovery Miles 5 560 Ships in 18 - 22 working days
121 First Dates - How to Succeed at Online Dating, Fall in Love, and Live Happily Ever After (Really!) (Paperback): Wendy Newman 121 First Dates - How to Succeed at Online Dating, Fall in Love, and Live Happily Ever After (Really!) (Paperback)
Wendy Newman 1
R373 R350 Discovery Miles 3 500 Save R23 (6%) Ships in 18 - 22 working days

Based on years of research and 121 real-life first dates, relationship expert Wendy Newman dishes up practical wisdom for navigating the online dating trenches with grace, efficiency, and a strong dose of humour. Wendy Newman has made every imaginable dating mistake so you don't have to. Part guidebook, part personal tell-all, 121 First Dates chronicles Wendy's funny, real-life misadventures and the practical wisdom she gained from them. Her dating tales will find you laughing, commiserating, and nodding your head as you learn how to stay in the dating game until you find the right man, just like Wendy did. This book busts myths, answers age-old questions, and examines pitfalls that make you want to give up on dating altogether. Just when you're about to submit to a lifetime at home with a pint of Haagen-Dazs and sitcom reruns, 121 First Dates will inspire you to keep stepping out. Wendy discusses how to date successfully and efficiently, avoid the most common dating pitfalls, have an amazing first date with anyone, end uncomfortable situations with grace, and much, much more. She offers up realistic Dos and Don'ts as well as tips for making the most of any situation you find yourself in-whether you want to run or you think he's the one. Brimming with humour, hope, and authenticity, 121 First Dates will give every woman the tools, confidence, and determination to be and stay real when dating. How else will you find the best match for you?

Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya,... Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya, Sanjoy Das
R6,677 Discovery Miles 66 770 Ships in 18 - 22 working days

Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.

Online Health and Safety - From Cyberbullying to Internet Addiction (Hardcover): Bernadette H Schell Online Health and Safety - From Cyberbullying to Internet Addiction (Hardcover)
Bernadette H Schell
R3,170 R2,864 Discovery Miles 28 640 Save R306 (10%) Ships in 10 - 15 working days

This book explores 10 unique facets of Internet health and safety, including physical safety, information security, and the responsible use of technology, offering takeaways from interviews with experts in the field and suggestions for proactively improving users' Internet safety. The Internet has become for many people—especially students and young adults—an essential and intrinsic part of their lives. It makes information available to be shared worldwide, at any time; enables learning about any topic; and allows for instantaneous communication. And it provides endless entertainment as well. But the benefits of online access are accompanied by serious potential risks. This book covers the key elements of Internet health and safety, including physical safety, information security, and the responsible use of technology. It begins with an introductory essay that gives readers the necessary conceptual framework, and then explains specific topics such as cyberbullying, file sharing, online predators, Internet fraud, and obscene and offensive content. The book also answers readers' questions in a "Q & A" section with a subject expert and includes a directory of resources that provides additional information and serves as a gateway to further study.

Auditing Information Systems - Enhancing Performance of the Enterprise (Hardcover): Abraham Nyirongo Auditing Information Systems - Enhancing Performance of the Enterprise (Hardcover)
Abraham Nyirongo
R611 Discovery Miles 6 110 Ships in 10 - 15 working days
Corporate Security Crossroads - Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment... Corporate Security Crossroads - Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment (Hardcover)
Richard J. Chasdi; Foreword by Yair Sharan
R1,942 R1,741 Discovery Miles 17 410 Save R201 (10%) Ships in 10 - 15 working days

Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance. Multinational corporations are on the front lines of terrorism and cyberattacks—two of the world's biggest threats to global security. How can corporate leaders mitigate their organizations' risks and develop an infrastructure that detects and deters a security menace before it happens? This timely reference lays out essential political context and historical background to help executives identify contemporary threats and understand the interconnections between threat dynamics in an increasingly dangerous international environment. This compelling work is organized into seven chapters. The beginning chapters profile the specific risks for multinational companies and detail which global—and regional—factors might propagate violence targeted at American-based businesses. Next, two historical case studies on terrorist assaults at Tigantourine and Mombasa illustrate how counterterrorism can successfully thwart potential attacks against business targets. The final part describes industrial espionage and criminal activity and then outlines a corporate counterterror blueprint to combat the prospect of terrorism, providing specific recommendations for preventative measures.

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover): Niranjan K.... Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover)
Niranjan K. Ray, Ashok Kumar Turuk
R7,161 Discovery Miles 71 610 Ships in 18 - 22 working days

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Designing for Human-Machine Symbiosis using the URANOS Model - Emerging Research and Opportunities (Hardcover): Benjamin Hadorn Designing for Human-Machine Symbiosis using the URANOS Model - Emerging Research and Opportunities (Hardcover)
Benjamin Hadorn
R3,168 Discovery Miles 31 680 Ships in 18 - 22 working days

Demand for integral and sustainable solutions is on the rise. As new ways of defining reality emerge, this generates the progression of more humanistic and sustainable construction of operating systems. Designing for Human-Machine Symbiosis using the URANOS Model: Emerging Research and Opportunities is a pivotal reference source for the latest research on human-centered system modeling and methods to provide a generic system model to describe complex non-linear systems. Featuring extensive coverage across a range of relevant topics, such as pervasive computing systems, smart environments, and smart industrial machines, this book is ideally designed for researchers, engineers, and professionals seeking current research on the integration of human beings and their natural, informational, and socio-cultural environments into system design.

Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,286 Discovery Miles 52 860 Ships in 18 - 22 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

Deep Learning for Beginners - A comprehensive introduction of deep learning fundamentals for beginners to understanding... Deep Learning for Beginners - A comprehensive introduction of deep learning fundamentals for beginners to understanding frameworks, neural networks, large datasets, and creative applications with ease (Hardcover)
Steven Cooper
R604 R548 Discovery Miles 5 480 Save R56 (9%) Ships in 18 - 22 working days
Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover)
Information R Management Association
R5,773 Discovery Miles 57 730 Ships in 18 - 22 working days
Network Security and Cryptography (Paperback): Sarhan M. Musa Network Security and Cryptography (Paperback)
Sarhan M. Musa
R1,200 R1,003 Discovery Miles 10 030 Save R197 (16%) Ships in 18 - 22 working days

Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions

Encyclopedia of E-Commerce Development, Implementation, and Management, VOL 2 (Hardcover): in Lee Encyclopedia of E-Commerce Development, Implementation, and Management, VOL 2 (Hardcover)
in Lee
R22,950 Discovery Miles 229 500 Ships in 18 - 22 working days
Unlevel the Playing Field - The Biggest Mindshift in PPC History (Hardcover): Frederick Vallaeys Unlevel the Playing Field - The Biggest Mindshift in PPC History (Hardcover)
Frederick Vallaeys
R528 Discovery Miles 5 280 Ships in 10 - 15 working days
The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover): Per Larsen, Ahmad-Reza Sadeghi The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover)
Per Larsen, Ahmad-Reza Sadeghi
R2,482 Discovery Miles 24 820 Ships in 18 - 22 working days

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Internet of Things (Hardcover): Fausto Pedro Garcia Marquez Internet of Things (Hardcover)
Fausto Pedro Garcia Marquez
R3,053 Discovery Miles 30 530 Ships in 18 - 22 working days
Encyclopedia of Physical Bitcoins and Crypto-Currencies, Revised Edition (Hardcover, Revised, from Original Softcover ed.):... Encyclopedia of Physical Bitcoins and Crypto-Currencies, Revised Edition (Hardcover, Revised, from Original Softcover ed.)
Elias Ahonen; Foreword by Matthew J Rippon; Edited by Howard Kesselman
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days
Bioinformatics: Principles and Analysis (Hardcover): Gretchen Kenney Bioinformatics: Principles and Analysis (Hardcover)
Gretchen Kenney
R3,289 R2,979 Discovery Miles 29 790 Save R310 (9%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Oracle 12c - SQL
Joan Casteel Paperback  (1)
R1,321 R1,228 Discovery Miles 12 280
Database Systems - Design…
Carlos Coronel, Steven Morris Paperback R1,395 R1,299 Discovery Miles 12 990
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, … Paperback R1,109 R1,049 Discovery Miles 10 490
The Hitchhiker's Guide To AI - The…
Arthur Goldstuck Paperback R330 R299 Discovery Miles 2 990
E-Commerce In South Africa
Adheesh Budree Paperback R445 Discovery Miles 4 450
Clean Architecture - A Craftsman's Guide…
Robert Martin Paperback  (1)
R860 R619 Discovery Miles 6 190
Digital Dharma - How AI Can Elevate…
Deepak Chopra Paperback R440 R393 Discovery Miles 3 930
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,193 R1,119 Discovery Miles 11 190
Problem Solving with C++ - Global…
Walter Savitch Paperback R2,548 Discovery Miles 25 480

 

Partners