0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (69)
  • R250 - R500 (363)
  • R500+ (14,441)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,135 Discovery Miles 11 350 Ships in 10 - 15 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Insightful Data Visualization with SAS Viya (Hardcover): Falko Schulz, Travis Murphy Insightful Data Visualization with SAS Viya (Hardcover)
Falko Schulz, Travis Murphy
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days
Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R7,311 Discovery Miles 73 110 Ships in 18 - 22 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Encyclopedia of Information Ethics and Security (Hardcover): Encyclopedia of Information Ethics and Security (Hardcover)
R8,189 Discovery Miles 81 890 Ships in 18 - 22 working days

The "Encyclopedia of Information Ethics and Security" is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool covers such topics as computer crime, information warfare, privacy, surveillance, intellectual property, and education.

Deep Learning for Beginners - A comprehensive introduction of deep learning fundamentals for beginners to understanding... Deep Learning for Beginners - A comprehensive introduction of deep learning fundamentals for beginners to understanding frameworks, neural networks, large datasets, and creative applications with ease (Hardcover)
Steven Cooper
R604 R548 Discovery Miles 5 480 Save R56 (9%) Ships in 18 - 22 working days
Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover): Rajeev Singh, Mangey Ram Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover)
Rajeev Singh, Mangey Ram
R4,457 Discovery Miles 44 570 Ships in 10 - 15 working days

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications. De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Advanced Database Query Systems - Techniques, Applications and Technologies (Hardcover): Li Yan, Zongmin Ma Advanced Database Query Systems - Techniques, Applications and Technologies (Hardcover)
Li Yan, Zongmin Ma
R4,606 Discovery Miles 46 060 Ships in 18 - 22 working days

Databases are designed to support data storage, processing, and retrieval activities related to data management. The use of databases in various applications has resulted in an enormous wealth of data, which populates many types of databases around the world. Advanced Database Query Systems: Techniques, Applications and Technologies focuses on technologies and methodologies of database queries, XML and metadata queries, and applications of database query systems, aiming at providing a single account of technologies and practices in advanced database query systems. This book provides the state of the art information for academics, researchers and industry practitioners who are interested in the study, use, design and development of advanced and emerging database queries with ultimate aim of building competencies for exploiting the opportunities of the data and knowledge society.

Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies... Lean Enterprise - The Essential Step-by-Step Guide to Building a Lean Business with Six Sigma, Kanban, and 5S Methodologies (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R625 R559 Discovery Miles 5 590 Save R66 (11%) Ships in 18 - 22 working days
Cross-Disciplinary Models and Applications of Database Management - Advancing Approaches (Hardcover): Keng Siau Cross-Disciplinary Models and Applications of Database Management - Advancing Approaches (Hardcover)
Keng Siau
R5,017 Discovery Miles 50 170 Ships in 18 - 22 working days

Within a given enterprise, database management involves the monitoring, administration, and maintenance of the databases, which constantly change with new technologies and new forms of data. Cross-Disciplinary Models and Applications of Database Management: Advancing Approaches is an updated look at the latest tools and technology within the burgeoning field of database management. Perfect for the network administrator, technician, information technology specialist or consultant, or for academics and students, this volume presents the latest the field has to offer by way of cases and new research. As database languages, models, and systems change, it s vital for practitioners within the field to stay abreast of the latest research and methods being used around the world, and this book offers the most current advances available.

Data Intensive Distributed Computing - Challenges and Solutions for Large-scale Information Management (Hardcover, Revised... Data Intensive Distributed Computing - Challenges and Solutions for Large-scale Information Management (Hardcover, Revised ed.)
Tevfik Kosar
R4,582 Discovery Miles 45 820 Ships in 18 - 22 working days

Data Intensive Distributed Computing: Challenges and Solutions for Large-scale Information Management focuses on the challenges of distributed systems imposed by data intensive applications and on the different state-of-the-art solutions proposed to overcome such challenges. Providing hints on how to manage low-level data handling issues when performing data intensive distributed computing, this publication is ideal for scientists, researchers, engineers, and application developers, alike. With the knowledge of the correct data management techniques for their applications, readers will be able to focus on their primary goal, assured that their data management needs are handled reliably and efficiently.

e-Democracy - Toward a New Model of (Inter)active Society (Hardcover, 1st ed. 2019): Alfredo M. Ronchi e-Democracy - Toward a New Model of (Inter)active Society (Hardcover, 1st ed. 2019)
Alfredo M. Ronchi
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

This book explores the main elements of e-Democracy, the term normally used to describe the implementation of democratic government processes by electronic means. It provides insights into the main technological and human issues regarding governance, government, participation, inclusion, empowerment, procurement and, last but not least, ethical and privacy issues. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services totally or partially delivered by governments or non-government organizations. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflows, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. This includes having a significant population of citizens who are willing and able to adopt and use online services; as well as developing the managerial and technical capability to implement applications that meet citizens' needs. This book helps readers understand the mutual dependencies involved; further, a selection of success stories and failures, duly commented on, enables readers to identify the right approach to innovation in governmental e-Services. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.

Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover): Husrev T. Sencar, Mahalingam... Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover)
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019): Amit Kumar Singh, Anand... Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019)
Amit Kumar Singh, Anand Mohan
R6,633 Discovery Miles 66 330 Ships in 10 - 15 working days

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.

Innovative Computing Trends and Applications (Hardcover, 1st ed. 2019): Pandian Vasant, Igor Litvinchev, Jose Antonio... Innovative Computing Trends and Applications (Hardcover, 1st ed. 2019)
Pandian Vasant, Igor Litvinchev, Jose Antonio Marmolejo-Saucedo
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides a survey on research, development, and trends in innovative computing in communications engineering and computer science. It features selected and expanded papers from the EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018), with contributions by top global researchers and practitioners in the field. The content is of relevance to computer science graduates, researchers and academicians in computer science and engineering. The authors discuss new technologies in computer science and engineering that have reduced the dimension of data coverage worldwide, reducing the gaps and coverage of domains globally. They discuss how these advances have also contributed to strength in prediction, analysis, and decision in the areas such as Technology, Management, Social Computing, Green Computing, and Telecom. Contributions show how nurturing the research in technology and computing is essential to finding the right pattern in the ocean of data. Focuses on research areas of innovative computing and its application in engineering and technology; Includes contributions from researchers in computing and engineering from around the world; Features selected and expanded papers from EAI International Conference on Computer Science and Engineering 2018 (COMPSE 2018).

Big Data: Conceptual Analysis and Applications (Hardcover, 1st ed. 2020): Michael Z. Zgurovsky, Yuriy P. Zaychenko Big Data: Conceptual Analysis and Applications (Hardcover, 1st ed. 2020)
Michael Z. Zgurovsky, Yuriy P. Zaychenko
R3,363 Discovery Miles 33 630 Ships in 18 - 22 working days

The book is devoted to the analysis of big data in order to extract from these data hidden patterns necessary for making decisions about the rational behavior of complex systems with the different nature that generate this data. To solve these problems, a group of new methods and tools is used, based on the self-organization of computational processes, the use of crisp and fuzzy cluster analysis methods, hybrid neural-fuzzy networks, and others. The book solves various practical problems. In particular, for the tasks of 3D image recognition and automatic speech recognition large-scale neural networks with applications for Deep Learning systems were used. Application of hybrid neuro-fuzzy networks for analyzing stock markets was presented. The analysis of big historical, economic and physical data revealed the hidden Fibonacci pattern about the course of systemic world conflicts and their connection with the Kondratieff big economic cycles and the Schwabe-Wolf solar activity cycles. The book is useful for system analysts and practitioners working with complex systems in various spheres of human activity.

Building and Maintaining a Data Warehouse (Paperback): Fon Silvers Building and Maintaining a Data Warehouse (Paperback)
Fon Silvers
R1,875 Discovery Miles 18 750 Ships in 10 - 15 working days

As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data warehouse that incorporates all the right concepts, taking the steps needed to create a warehouse that is as functional and user-friendly as it is theoretically sound, is not especially easy. That's the challenge that Building and Maintaininga Data Warehouse answers. Based on a foundation of industry-accepted principles, this work provides an easy-to-follow approach that is cohesive and holistic. By offering the perspective of a successful data warehouse, as well as that of a failed one, this workdetails those factors that must be accomplished and those that are best avoided. Organized to logically progress from more general to specific information, this valuable guide: Presents areas of a data warehouse individually and in sequence, showing how each piece becomes a working part of the whole Examines the concepts and principles that are at the foundation of every successful data warehouse Explains how to recognize and attend to problematic gaps in an established data warehouse Provides the big picture perspective that planners and executives require Those considering the planning and creation of a data warehouse, as well as those who've already built one will profit greatly from the insights garnered by the author during his years of creating and gathering information on state-of-the-art data warehouses that are accessible, convenient, and reliable.

Lean Startup - How to Apply the Lean Startup Methodology to Innovate, Accelerate, and Create Successful Businesses (Lean Guides... Lean Startup - How to Apply the Lean Startup Methodology to Innovate, Accelerate, and Create Successful Businesses (Lean Guides with Scrum, Sprint, Kanban, DSDM, XP & Crystal) (Hardcover)
Greg Caldwell
R625 R559 Discovery Miles 5 590 Save R66 (11%) Ships in 18 - 22 working days
Advances in Computers, Volume 57 - Information Repositories (Hardcover): Marvin Zelkowitz Advances in Computers, Volume 57 - Information Repositories (Hardcover)
Marvin Zelkowitz
R3,917 Discovery Miles 39 170 Ships in 10 - 15 working days

Advances in Computers remains at the forefront in presenting the new developments in the ever-changing field of information technology. Since 1960, Advances in Computers has chronicled the constantly shifting theories and methods of this technology that greatly shape our lives today.
"Information Repositories" focuses on the use of large data repositories to store and retrieve information.
This series is an invaluable addition to any university course in computer technology, as well as finding itself at home on the bookshelf of industrial practitioners.
* Includes in-depth surveys and tutorials on advances in Computer Technology. * Features the work of well-known authors and researchers in the field.
* Provides a broad overview of important developments.
* Contains extensive bibliographies.

Intelligent Data Analysis - Developing New Methodologies Through Pattern Discovery and Recovery (Hardcover): Hsiao-Fan Wang Intelligent Data Analysis - Developing New Methodologies Through Pattern Discovery and Recovery (Hardcover)
Hsiao-Fan Wang
R4,592 Discovery Miles 45 920 Ships in 18 - 22 working days

Pattern Recognition has a long history of applications to data analysis in business, military and social economic activities. While the aim of pattern recognition is to discover the pattern of a data set, the size of the data set is closely related to the methodology one adopts for analysis. Intelligent Data Analysis: Developing New Methodologies Through Pattern Discovery and Recovery tackles those data sets and covers a variety of issues in relation to intelligent data analysis so that patterns from frequent or rare events in spatial or temporal spaces can be revealed. This book brings together current research, results, problems, and applications from both theoretical and practical approaches.

Mobile Solutions and Their Usefulness in Everyday Life (Hardcover, 1st ed. 2019): Sara Paiva Mobile Solutions and Their Usefulness in Everyday Life (Hardcover, 1st ed. 2019)
Sara Paiva
R2,695 Discovery Miles 26 950 Ships in 18 - 22 working days

This book provides an insight into recent technological trends and innovations in solutions and platforms to improve mobility of visually impaired people. The authors' goal is to help to contribute to the social and societal inclusion of the visually impaired. The book's topics include, but are not limited to, obstacle detection systems, indoor and outdoor navigation, transportation sustainability systems, and hardware/devices to aid visually impaired people. The book has a strong focus on practical applications tested in a real environment. Applications include city halls, municipalities, and companies that must keep up to date with recent trends in platforms, methodologies and technologies to promote urban mobility. Also discuss are broader realms including education, health, electronics, tourism, and transportation. Contributors include a variety of researchers and practitioners around the world.

Blockchain Applications (Hardcover): Arshdeep Bagha Blockchain Applications (Hardcover)
Arshdeep Bagha
R1,870 R1,522 Discovery Miles 15 220 Save R348 (19%) Ships in 18 - 22 working days
Uncovering Essential Software Artifacts through Business Process Archeology (Hardcover): Ricardo Perez-Castillo, Mario G.... Uncovering Essential Software Artifacts through Business Process Archeology (Hardcover)
Ricardo Perez-Castillo, Mario G. Piattini
R4,995 Discovery Miles 49 950 Ships in 18 - 22 working days

Corporations accumulate a lot of valuable data and knowledge over time, but storing and maintaining this data can be a logistic and financial headache for business leaders and IT specialists. Uncovering Essential Software Artifacts through Business Process Archaeology introduces an emerging method of software modernisation used to effectively manage legacy systems and company operations supported by such systems. This book presents methods, techniques, and new trends on business process archaeology as well as some industrial success stories. Business experts, professionals, and researchers working in the field of information and knowledge management will use this reference source to efficiently and effectively implement and utilise business knowledge.

Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Current Issues and Trends in E-government Research (Hardcover): Current Issues and Trends in E-government Research (Hardcover)
R2,494 Discovery Miles 24 940 Ships in 18 - 22 working days

As emerging trends and research threads surface in the area of e-government, academicians, practitioners, and students face the challenge of keeping up-to-date with new and innovative practices. ""Current Issues and Trends in E-Government Research"" provides a complete synopsis of the latest technologies in information policy, security, privacy, and access, as well as the best practices in e-government applications and measurement. ""Current Issues and Trends in E-Government Research"" presents the most current issues in e-government hardware and software technology, adoption and diffusion, planning and management, and philosophy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Khamr - The Makings Of A Waterslams
Jamil F. Khan Paperback  (5)
R283 Discovery Miles 2 830
Choreomania - Dance and Disorder
Kelina Gotman Hardcover R3,298 Discovery Miles 32 980
A Taste for China - English Subjectivity…
Eugenia Zuroski Jenkins Hardcover R3,058 Discovery Miles 30 580
The Oxford Handbook of Food Ethics
Anne Barnhill, Tyler Doggett, … Hardcover R4,181 Discovery Miles 41 810
The Power of the Past - Understanding…
Jessi Streib Hardcover R3,564 Discovery Miles 35 640
Renegades - Born In The USA
Barack Obama, Bruce Springsteen Hardcover  (1)
R1,057 R893 Discovery Miles 8 930
Music and the Muses - The Culture of…
Penelope Murray, Peter Wilson Hardcover R6,668 Discovery Miles 66 680
Haunted Lawrence
Paul Thomas Paperback R501 R468 Discovery Miles 4 680
Milwaukee Frozen Custard
Kathleen McCann Tanzilo, Robert Tanzilo Paperback R517 R486 Discovery Miles 4 860
Parallel Tracks - The Railroad and…
Lynne Kirby Hardcover R2,405 Discovery Miles 24 050

 

Partners