0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (46)
  • R100 - R250 (2,845)
  • R250 - R500 (12,528)
  • R500+ (105,970)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT

121 First Dates - How to Succeed at Online Dating, Fall in Love, and Live Happily Ever After (Really!) (Paperback): Wendy Newman 121 First Dates - How to Succeed at Online Dating, Fall in Love, and Live Happily Ever After (Really!) (Paperback)
Wendy Newman 1
R373 R350 Discovery Miles 3 500 Save R23 (6%) Ships in 18 - 22 working days

Based on years of research and 121 real-life first dates, relationship expert Wendy Newman dishes up practical wisdom for navigating the online dating trenches with grace, efficiency, and a strong dose of humour. Wendy Newman has made every imaginable dating mistake so you don't have to. Part guidebook, part personal tell-all, 121 First Dates chronicles Wendy's funny, real-life misadventures and the practical wisdom she gained from them. Her dating tales will find you laughing, commiserating, and nodding your head as you learn how to stay in the dating game until you find the right man, just like Wendy did. This book busts myths, answers age-old questions, and examines pitfalls that make you want to give up on dating altogether. Just when you're about to submit to a lifetime at home with a pint of Haagen-Dazs and sitcom reruns, 121 First Dates will inspire you to keep stepping out. Wendy discusses how to date successfully and efficiently, avoid the most common dating pitfalls, have an amazing first date with anyone, end uncomfortable situations with grace, and much, much more. She offers up realistic Dos and Don'ts as well as tips for making the most of any situation you find yourself in-whether you want to run or you think he's the one. Brimming with humour, hope, and authenticity, 121 First Dates will give every woman the tools, confidence, and determination to be and stay real when dating. How else will you find the best match for you?

Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover): Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya,... Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks (Hardcover)
Ram Shringar Rao, Nanhay Singh, Omprakash Kaiwartya, Sanjoy Das
R6,677 Discovery Miles 66 770 Ships in 18 - 22 working days

Vehicular traffic congestion and accidents remain universal issues in today's world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.

Online Health and Safety - From Cyberbullying to Internet Addiction (Hardcover): Bernadette H Schell Online Health and Safety - From Cyberbullying to Internet Addiction (Hardcover)
Bernadette H Schell
R3,170 R2,864 Discovery Miles 28 640 Save R306 (10%) Ships in 10 - 15 working days

This book explores 10 unique facets of Internet health and safety, including physical safety, information security, and the responsible use of technology, offering takeaways from interviews with experts in the field and suggestions for proactively improving users' Internet safety. The Internet has become for many people—especially students and young adults—an essential and intrinsic part of their lives. It makes information available to be shared worldwide, at any time; enables learning about any topic; and allows for instantaneous communication. And it provides endless entertainment as well. But the benefits of online access are accompanied by serious potential risks. This book covers the key elements of Internet health and safety, including physical safety, information security, and the responsible use of technology. It begins with an introductory essay that gives readers the necessary conceptual framework, and then explains specific topics such as cyberbullying, file sharing, online predators, Internet fraud, and obscene and offensive content. The book also answers readers' questions in a "Q & A" section with a subject expert and includes a directory of resources that provides additional information and serves as a gateway to further study.

Auditing Information Systems - Enhancing Performance of the Enterprise (Hardcover): Abraham Nyirongo Auditing Information Systems - Enhancing Performance of the Enterprise (Hardcover)
Abraham Nyirongo
R611 Discovery Miles 6 110 Ships in 10 - 15 working days
Corporate Security Crossroads - Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment... Corporate Security Crossroads - Responding to Terrorism, Cyberthreats, and Other Hazards in the Global Business Environment (Hardcover)
Richard J. Chasdi; Foreword by Yair Sharan
R1,942 R1,741 Discovery Miles 17 410 Save R201 (10%) Ships in 10 - 15 working days

Even though terrorism poses an increasing threat to multinational companies, corporate leaders can thwart attacks by learning to navigate the complexities of foreign governments, social unrest, and cultural dissonance. Multinational corporations are on the front lines of terrorism and cyberattacks—two of the world's biggest threats to global security. How can corporate leaders mitigate their organizations' risks and develop an infrastructure that detects and deters a security menace before it happens? This timely reference lays out essential political context and historical background to help executives identify contemporary threats and understand the interconnections between threat dynamics in an increasingly dangerous international environment. This compelling work is organized into seven chapters. The beginning chapters profile the specific risks for multinational companies and detail which global—and regional—factors might propagate violence targeted at American-based businesses. Next, two historical case studies on terrorist assaults at Tigantourine and Mombasa illustrate how counterterrorism can successfully thwart potential attacks against business targets. The final part describes industrial espionage and criminal activity and then outlines a corporate counterterror blueprint to combat the prospect of terrorism, providing specific recommendations for preventative measures.

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover): Niranjan K.... Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (Hardcover)
Niranjan K. Ray, Ashok Kumar Turuk
R7,161 Discovery Miles 71 610 Ships in 18 - 22 working days

The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these technologies must be addressed in order to effectively utilize them. The Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures is a pivotal reference source for the latest research on recent innovations and developments in the field of wireless sensors. Examining the advantages and challenges presented by the application of these networks in various areas, this book is ideally designed for academics, researchers, students, and IT developers.

Designing for Human-Machine Symbiosis using the URANOS Model - Emerging Research and Opportunities (Hardcover): Benjamin Hadorn Designing for Human-Machine Symbiosis using the URANOS Model - Emerging Research and Opportunities (Hardcover)
Benjamin Hadorn
R3,168 Discovery Miles 31 680 Ships in 18 - 22 working days

Demand for integral and sustainable solutions is on the rise. As new ways of defining reality emerge, this generates the progression of more humanistic and sustainable construction of operating systems. Designing for Human-Machine Symbiosis using the URANOS Model: Emerging Research and Opportunities is a pivotal reference source for the latest research on human-centered system modeling and methods to provide a generic system model to describe complex non-linear systems. Featuring extensive coverage across a range of relevant topics, such as pervasive computing systems, smart environments, and smart industrial machines, this book is ideally designed for researchers, engineers, and professionals seeking current research on the integration of human beings and their natural, informational, and socio-cultural environments into system design.

Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,286 Discovery Miles 52 860 Ships in 18 - 22 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

Deep Learning for Beginners - A comprehensive introduction of deep learning fundamentals for beginners to understanding... Deep Learning for Beginners - A comprehensive introduction of deep learning fundamentals for beginners to understanding frameworks, neural networks, large datasets, and creative applications with ease (Hardcover)
Steven Cooper
R604 R548 Discovery Miles 5 480 Save R56 (9%) Ships in 18 - 22 working days
Network Security and Cryptography (Paperback): Sarhan M. Musa Network Security and Cryptography (Paperback)
Sarhan M. Musa
R1,200 R1,003 Discovery Miles 10 030 Save R197 (16%) Ships in 18 - 22 working days

Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions

Encyclopedia of E-Commerce Development, Implementation, and Management, VOL 2 (Hardcover): in Lee Encyclopedia of E-Commerce Development, Implementation, and Management, VOL 2 (Hardcover)
in Lee
R22,950 Discovery Miles 229 500 Ships in 18 - 22 working days
The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover): Per Larsen, Ahmad-Reza Sadeghi The Continuing Arms Race - Code-Reuse Attacks and Defenses (Hardcover)
Per Larsen, Ahmad-Reza Sadeghi
R2,482 Discovery Miles 24 820 Ships in 18 - 22 working days

As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system. The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs. The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Internet of Things (Hardcover): Fausto Pedro Garcia Marquez Internet of Things (Hardcover)
Fausto Pedro Garcia Marquez
R3,053 Discovery Miles 30 530 Ships in 18 - 22 working days
Encyclopedia of Physical Bitcoins and Crypto-Currencies, Revised Edition (Hardcover, Revised, from Original Softcover ed.):... Encyclopedia of Physical Bitcoins and Crypto-Currencies, Revised Edition (Hardcover, Revised, from Original Softcover ed.)
Elias Ahonen; Foreword by Matthew J Rippon; Edited by Howard Kesselman
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days
Bioinformatics: Principles and Analysis (Hardcover): Gretchen Kenney Bioinformatics: Principles and Analysis (Hardcover)
Gretchen Kenney
R3,289 R2,979 Discovery Miles 29 790 Save R310 (9%) Ships in 18 - 22 working days
Switched-Mode Power Supply Simulation with SPICE - The Faraday Press Edition (Hardcover): Steven M. Sandler Switched-Mode Power Supply Simulation with SPICE - The Faraday Press Edition (Hardcover)
Steven M. Sandler
R1,404 Discovery Miles 14 040 Ships in 18 - 22 working days
Handbook of Research on Artificial Intelligence Techniques and Algorithms, Vol 2 (Hardcover): Pandian Vasant Handbook of Research on Artificial Intelligence Techniques and Algorithms, Vol 2 (Hardcover)
Pandian Vasant
R7,439 Discovery Miles 74 390 Ships in 18 - 22 working days
Modeling and Simulation Techniques in Structural Engineering (Hardcover): Pijush Samui, Subrata Chakraborty, Dookie Kim Modeling and Simulation Techniques in Structural Engineering (Hardcover)
Pijush Samui, Subrata Chakraborty, Dookie Kim
R5,624 Discovery Miles 56 240 Ships in 18 - 22 working days

The development of new and effective analytical and numerical models is essential to understanding the performance of a variety of structures. As computational methods continue to advance, so too do their applications in structural performance modeling and analysis. Modeling and Simulation Techniques in Structural Engineering presents emerging research on computational techniques and applications within the field of structural engineering. This timely publication features practical applications as well as new research insights and is ideally designed for use by engineers, IT professionals, researchers, and graduate-level students.

Balancing Agile and Disciplined Engineering and Management Approaches for IT Services and Software Products (Hardcover): Manuel... Balancing Agile and Disciplined Engineering and Management Approaches for IT Services and Software Products (Hardcover)
Manuel Mora, Jorge Marx Gomez, Rory V. O'Connor, Alena Buchalcevova
R6,268 Discovery Miles 62 680 Ships in 18 - 22 working days

The highly dynamic world of information technology service management stresses the benefits of the quick and correct implementation of IT services. A disciplined approach relies on a separate set of assumptions and principles as an agile approach, both of which have complicated implementation processes as well as copious benefits. Combining these two approaches to enhance the effectiveness of each, while difficult, can yield exceptional dividends. Balancing Agile and Disciplined Engineering and Management Approaches for IT Services and Software Products is an essential publication that focuses on clarifying theoretical foundations of balanced design methods with conceptual frameworks and empirical cases. Highlighting a broad range of topics including business trends, IT service, and software development, this book is ideally designed for software engineers, software developers, programmers, information technology professionals, researchers, academicians, and students.

Python Programming For Beginners - Learn Python In 5 Days with Step-By-Step Guidance, Hands-On Exercises And Solution... Python Programming For Beginners - Learn Python In 5 Days with Step-By-Step Guidance, Hands-On Exercises And Solution (Hardcover)
James Tudor
R672 Discovery Miles 6 720 Ships in 18 - 22 working days
Computational Models in Engineering (Hardcover): Konstantin Volkov Computational Models in Engineering (Hardcover)
Konstantin Volkov
R3,065 Discovery Miles 30 650 Ships in 18 - 22 working days
Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback): Sushil K. Prasad,... Topics in Parallel and Distributed Computing - Introducing Concurrency in Undergraduate Courses (Paperback)
Sushil K. Prasad, Anshul Gupta, Arnold L. Rosenberg, Alan Sussman, Charles C Weems, Jr.
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.

Structured Search for Big Data - From Keywords to Key-objects (Paperback): Mikhail Gilula Structured Search for Big Data - From Keywords to Key-objects (Paperback)
Mikhail Gilula
R680 Discovery Miles 6 800 Ships in 10 - 15 working days

The WWW era made billions of people dramatically dependent on the progress of data technologies, out of which Internet search and Big Data are arguably the most notable. Structured Search paradigm connects them via a fundamental concept of key-objects evolving out of keywords as the units of search. The key-object data model and KeySQL revamp the data independence principle making it applicable for Big Data and complement NoSQL with full-blown structured querying functionality. The ultimate goal is extracting Big Information from the Big Data. As a Big Data Consultant, Mikhail Gilula combines academic background with 20 years of industry experience in the database and data warehousing technologies working as a Sr. Data Architect for Teradata, Alcatel-Lucent, and PayPal, among others. He has authored three books, including The Set Model for Database and Information Systems and holds four US Patents in Structured Search and Data Integration.

N-ary Relations for Logical Analysis of Data and Knowledge (Hardcover): Boris Kulik, Alexander Fridman N-ary Relations for Logical Analysis of Data and Knowledge (Hardcover)
Boris Kulik, Alexander Fridman
R5,575 Discovery Miles 55 750 Ships in 18 - 22 working days

Mathematics has been used as a tool in logistical reasoning for centuries. Examining how specific mathematic structures can aid in data and knowledge management helps determine how to efficiently and effectively process more information in these fields. N-ary Relations for Logical Analysis of Data and Knowledge is a critical scholarly reference source that provides a detailed study of the mathematical techniques currently involved in the progression of information technology fields. Featuring relevant topics that include algebraic sets, deductive analysis, defeasible reasoning, and probabilistic modeling, this publication is ideal for academicians, students, and researchers who are interested in staying apprised of the latest research in the information technology field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances In Chinese Document And Text…
Chenglin Liu, Yue Lu Hardcover R3,059 Discovery Miles 30 590
Pattern Recognition and String Matching
Dechang Chen, Xiuzhen Cheng Hardcover R2,837 Discovery Miles 28 370
Data Science From Scratch - The #1 Data…
Steven Cooper Hardcover R633 R577 Discovery Miles 5 770
Mobile Networks for Biometric Data…
Massimo Conti, Natividad Martinez Madrid, … Hardcover R6,197 Discovery Miles 61 970
Mathematical Methods for Knowledge…
Giovanni Felici, Carlo Vercellis Hardcover R4,630 Discovery Miles 46 300
Advances in Computer Vision - Volume 2
C Brown, Christopher Brown Hardcover R4,494 Discovery Miles 44 940
Knowledge Discovery in Big Data from…
Petr Skoda, Fathalrahman Adam Paperback R2,461 Discovery Miles 24 610
Research Anthology on Big Data…
Information R Management Association Hardcover R15,738 Discovery Miles 157 380
S5000F, International specification for…
Asd Hardcover R1,137 Discovery Miles 11 370
Neural Representations of Natural…
Lyndon White, Roberto Togneri, … Hardcover R2,427 Discovery Miles 24 270

 

Partners