0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (45)
  • R250 - R500 (244)
  • R500+ (10,178)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Cloud Reliability Engineering - Technologies and Tools (Paperback): Rathnakar Achary, Pethuru Raj Cloud Reliability Engineering - Technologies and Tools (Paperback)
Rathnakar Achary, Pethuru Raj
R1,758 Discovery Miles 17 580 Ships in 12 - 17 working days

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book's chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.

Project Management Maturity Model (Hardcover, 4th edition): J.Kent Crawford Project Management Maturity Model (Hardcover, 4th edition)
J.Kent Crawford
R2,129 Discovery Miles 21 290 Ships in 12 - 17 working days

Assisting organizations in improving their project management processes, the Project Management Maturity Model defines the industry standard for measuring project management maturity and agile and adaptive capabilities. Project Management Maturity Model, Fourth Edition provides a roadmap showing organizations how to move to higher levels of organizational behavior, improving project success and organizational performance. It's a comprehensive tool for enhancing project management practices, covering areas critical to organizational improvement, such as the project management office, management oversight, and professional development. It also provides methods for optimizing project management processes and suggestions for deploying the model as a strategic tool in improving business outcomes. New material in each chapter also outlines good practices for implementing adaptive an agile processes. The book also includes the Project Portfolio Management Maturity Model, which covers best practices for determining portfolio maturity, setting short-term priorities, implementing benefits realization management, improving portfolio management processes and tracking progress. The author, J. Kent Crawford, CEO of PM Solutions, describes the basics of project management maturity, including the benefits of assessing maturity, and presents a comprehensive framework for improving organization's processes. Chapters are based on the ten project management knowledge areas specified in the Project Management Institute's standard, the PMBOK (R) Guide. This edition provides new and revised materials based on the PMBOK (R) Guide including a fresh focus on agile and adaptive methods, benefits realization, and organizational change management. Organizations can use this book to: Determine the maturity of your organization's project management processes Gauge readiness for agile transformation Map out a logical path to improve your organization's processes Set priorities for short-term process improvement Track and visualize improvements in project management over time Learn to translate process maturity into business results After an objective assessment, an organization can set its goals for increasing the capability of its processes and develop a plan for reaching those goals. This book is ideal for anyone involved with improving the capability of an organization's project and portfolio management processes.

Antennas - Rigorous Methods of Analysis and Synthesis (Hardcover): Boris Levin Antennas - Rigorous Methods of Analysis and Synthesis (Hardcover)
Boris Levin
R2,541 Discovery Miles 25 410 Ships in 10 - 15 working days

The book comprises a new method of solving the integral equation of Leontovich, the most rigorous and most effective equation for the current in thin linear antennas. The book describes the features of the new method in its application in various types of antennas. It considers new ways of analyzing antennas, in particular in the calculation of an antenna gain based on main radiation patterns and the calculation of the directional characteristics of radiators with known distribution of current amplitude. The method of electrostatic analogy proposed by the author, provides the base for comparison of electromagnetic fields of high-frequency currents and electrostatic charges located on linear conductors to improve the directional characteristics of log-periodic and director-type antennas. A new approach to the analysis of the electrical characteristics of a microstrip antenna, which allows expansion of its operation range, is substantiated and developed. New results of antenna synthesis are obtained. The second part of the book is devoted to specific types of antennas (the author had a significant role in their creation). Particular attention is given to ship antennas for different frequency ranges. The book is intended for professionals, working in electrodynamics and those working on development, placement and exploitation of antennas. It will be useful for lecturers (university-level professors), teachers, students of radio engineering and researchers working in various fields of radio electronics and interested in an in-depth study of theoretical problems and designs f antennas. It can also be used for short university courses.

Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback): Alan Weiss, Adam Shwartz Large Deviations For Performance Analysis - Queues, Communication and Computing (Paperback)
Alan Weiss, Adam Shwartz
R1,461 Discovery Miles 14 610 Ships in 12 - 17 working days

Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.

Model-Driven Engineering of Information Systems - Principles, Techniques, and Practice (Paperback): Liviu Gabriel Cretu, Florin... Model-Driven Engineering of Information Systems - Principles, Techniques, and Practice (Paperback)
Liviu Gabriel Cretu, Florin Dumitriu
R2,548 Discovery Miles 25 480 Ships in 12 - 17 working days

This title includes a number of Open Access chapters. Model-driven engineering (MDE) is the automatic production of software from simplified models of structure and functionality. It mainly involves the automation of the routine and technologically complex programming tasks, thus allowing developers to focus on the true value-adding functionality that the system needs to deliver. This book serves an overview of some of the core topics in MDE. The volume is broken into two sections offering a selection of papers that helps the reader not only understand the MDE principles and techniques, but also learn from practical examples. Also covered are the following topics: * MDE for software product lines * Formal methods for model transformation correctness * Metamodeling with Eclipse eCore * Metamodeling with UML profiles * Test cases generation This easily accessible reference volume offers a comprehensive guide to this rapidly expanding field. Edited by experienced writers with experience in both research and the practice of software engineering, Model-Driven Engineering of Information Systems: Principles, Techniques and Practice is an authoritative and easy-to-use reference, ideal for both researchers in the field and students who wish to gain an overview to this important field of study.

Electronics and Communications Engineering - Applications and Innovations (Paperback): T. Kishore Kumar, Ravi Kumar Jatoth, V... Electronics and Communications Engineering - Applications and Innovations (Paperback)
T. Kishore Kumar, Ravi Kumar Jatoth, V .V. Mani
R2,556 Discovery Miles 25 560 Ships in 12 - 17 working days

Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennas Communications systems Very large-scale integration Embedded systems Intelligent control and signal processing systems

Cybersecurity in the COVID-19 Pandemic (Hardcover): Kenneth Okereafor Cybersecurity in the COVID-19 Pandemic (Hardcover)
Kenneth Okereafor
R1,523 Discovery Miles 15 230 Ships in 12 - 17 working days

As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book's primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.

VANET - Challenges and Opportunities (Hardcover): Sonali P. Botkar, Sachin P. Godse, Parikshit N. Mahalle, Gitanjali R. Shinde VANET - Challenges and Opportunities (Hardcover)
Sonali P. Botkar, Sachin P. Godse, Parikshit N. Mahalle, Gitanjali R. Shinde
R1,551 Discovery Miles 15 510 Ships in 12 - 17 working days

VANET (vehicular ad hoc network) is a subgroup of MANET (mobile ad hoc network). It enables communication among vehicles on the road and between related infrastructures. This book addresses the basic elements of VANET along with components involved in the communication with their functionalities and configurations. It contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms, and protocols, and addresses the different services provided by VANET with the help of a scenario showing a network tackling an emergency. Features: * Covers all important concepts of VANET for beginners and different road scenarios in VANET * Covers essential communication protocols in VANET * Introduces approaches for VANET implementation using simulators * Provides a classification of messages and a priority-based message forwarding strategy This book is aimed at undergraduates, postgraduates, industry, researchers, and research scholars in information and communications technology.

Secure Searchable Encryption and Data Management (Hardcover): Mamta, Brij B. Gupta Secure Searchable Encryption and Data Management (Hardcover)
Mamta, Brij B. Gupta
R1,521 Discovery Miles 15 210 Ships in 12 - 17 working days

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.

Hybrid Encryption Algorithms over Wireless Communication Channels (Hardcover): Mai Helmy Shaheen Hybrid Encryption Algorithms over Wireless Communication Channels (Hardcover)
Mai Helmy Shaheen
R3,191 Discovery Miles 31 910 Ships in 12 - 17 working days

This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.

Cloud Computing - Concepts and Technologies (Hardcover): Sunilkumar Manvi, Gopal Shyam Cloud Computing - Concepts and Technologies (Hardcover)
Sunilkumar Manvi, Gopal Shyam
R3,202 Discovery Miles 32 020 Ships in 12 - 17 working days

Comprehensive and timely, Cloud Computing: Concepts and Technologies offers a thorough and detailed description of cloud computing concepts, architectures, and technologies, along with guidance on the best ways to understand and implement them. It covers the multi-core architectures, distributed and parallel computing models, virtualization, cloud developments, workload and Service-Level-Agreements (SLA) in cloud, workload management. Further, resource management issues in cloud with regard to resource provisioning, resource allocation, resource mapping and resource adaptation, ethical, non-ethical and security issues in cloud are followed by discussion of open challenges and future directions. This book gives students a comprehensive overview of the latest technologies and guidance on cloud computing, and is ideal for those studying the subject in specific modules or advanced courses. It is designed in twelve chapters followed by laboratory setups and experiments. Each chapter has multiple choice questions with answers, as well as review questions and critical thinking questions. The chapters are practically-focused, meaning that the information will also be relevant and useful for professionals wanting an overview of the topic.

Healthcare Informatics - Improving Efficiency through Technology, Analytics, and Management (Paperback): Stephan P. Kudyba Healthcare Informatics - Improving Efficiency through Technology, Analytics, and Management (Paperback)
Stephan P. Kudyba
R1,427 Discovery Miles 14 270 Ships in 12 - 17 working days

Healthcare Informatics: Improving Efficiency through Technology, Analytics, and Management supplies an understanding of the different types of healthcare service providers, corresponding information technologies, analytic methods, and data issues that play a vital role in transforming the healthcare industry. All of these elements are reshaping the various activities such as workflow and processes of hospitals, healthcare systems, ACOs, and patient analytics, including hot spotting, risk stratification, and treatment effectiveness. A follow-up to Healthcare Informatics: Improving Efficiency and Productivity, this latest book includes new content that examines the evolution of Big Data and how it is revolutionizing the healthcare industry. It presents strategies for achieving national goals for the meaningful use of health information technology and includes sound project management principles and case illustrations for technology roll-out, such as Computer Physician Order Entry (CPOE) for optimal utilization. The book describes how to enhance process efficiency by linking technologies, data, and analytics with strategic initiatives to achieve success. It explains how to leverage data resources with analytics to enhance decision support for care providers through in-depth descriptions of the array of analytic methods that are used to create actionable information, including Business Intelligence, Six Sigma, Data, and Text Mining.

Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover): Brij B.... Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover)
Brij B. Gupta, Amrita Dahiya
R1,530 Discovery Miles 15 300 Ships in 12 - 17 working days

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.

Portfolio Management - Delivering on Strategy (Paperback, 2nd edition): Carl Marnewick, John Wyzalek Portfolio Management - Delivering on Strategy (Paperback, 2nd edition)
Carl Marnewick, John Wyzalek
R1,388 Discovery Miles 13 880 Ships in 9 - 15 working days

Portfolio management is becoming the 'must have' for organizations to prosper and survive in this decade and beyond. No longer can the organizational focus be one of following best and repeatable practices as resource limitations mean only those programs, projects, and operational work that add business value can and should be pursued. Executives are focusing on strategic ability and managing complexity, which only can be done through a disciplined portfolio process in ensuring the best mix of programs, projects, and operational work is under way. In turn, the portfolio is constantly in flux as difficult decisions are made if a project, for example, is no longer contributing to business value and providing benefits and should be terminated to reallocate resources to one of higher priority. Commitment to this difficult approach is necessary at all levels, and communication is required so everyone knows how their work contributes to the organization's strategic goals and objectives. Portfolio Management: Delivering on Strategy, Second Edition focuses on the benefits of portfolio management to the organization. Its goal is to provide senior executives a view on how portfolio management can deliver organizational strategy. The emphasis is on the specific aspects within the portfolio management discipline and how each aspect should be managed from a business perspective and not necessarily from a portfolio management perspective. Highlights of the book include: Agile portfolio management Delivering organizational value Portfolio management and uncertainty Portfolio governance Marketing a portfolio Portfolio management success Starting with a review of the project portfolio concept and its development, the book is a reference for executives and practitioners in the field, as well as a students and researchers studying portfolio management.

Technological Challenges and Management - Matching Human and Business Needs (Paperback): Carolina Machado, J. Paulo Davim Technological Challenges and Management - Matching Human and Business Needs (Paperback)
Carolina Machado, J. Paulo Davim
R1,404 Discovery Miles 14 040 Ships in 12 - 17 working days

Today's organizations find themselves in a race to adopt new technologies in order to keep up with their competition. However, two questions must be answered: Are these organizations ready for new technological advancements, and are these new technologies appropriate for every organization? Technological Challenges and Management: Matching Human and Business Needs focuses on the new advances and challenges that today's organizations face in the areas of human resources and business, resulting from continuous and highly complex changes in technological resources. Organizations need to implement a more proactive and flexible management, matching their human and business needs. Due to this reality, it is important to study and understand varied contributions made by researchers, academics, and practitioners in this field of study worldwide. With the focus of this reality, this book exchanges experiences and perspectives about the state of technological challenges and management research, and future directions for this field of study. It also takes into account the deep implications that these challenges have in the organization of human resources. The authors support academics and researchers and those operating in the management field in dealing with different challenges that organizations face today. This is especially true concerning the relationship between technological changes, human resources management, and business. They propose the sharing of knowledge, through debate and information exchange, about technological challenges and management, matching the critical items of human and business needs. The book is divided into seven chapters that span from evaluating new technologies to finding the perfect fit.

Healthcare Informatics - Strategies for the Digital Era (Hardcover): Stephan P. Kudyba Healthcare Informatics - Strategies for the Digital Era (Hardcover)
Stephan P. Kudyba
R1,870 Discovery Miles 18 700 Ships in 12 - 17 working days

"This book addresses how health apps, in-home measurement devices, telemedicine, data mining, and artificial intelligence and smart medical algorithms are all enabled by the transition to a digital health infrastructure.....it provides a comprehensive background with which to understand what is happening in healthcare informatics and why."-C. William Hanson, III, MD, Chief Medical Information Officer and Vice President, University of Pennsylvania Health System. "This book is dedicated to the frontline healthcare workers, who through their courage and honor to their profession, helped maintain a reliable service to the population at large, during a chaotic time. These individuals withstood fear and engaged massive uncertainty and risk to perform their duties of providing care to those in need at a time of crisis. May the world never forget the COVID-19 pandemic and the courage of our healthcare workers".-Stephan P. Kudyba, Author Healthcare Informatics: Evolving Strategies in the Digital Era focuses on the services, technologies, and processes that are evolving in the healthcare industry. It begins with an introduction to the factors that are driving the digital age as it relates to the healthcare sector and then covers strategic topics such as risk management, project management, and knowledge management that are essential for successful digital initiatives. It delves into facets of the digital economy and how healthcare is adapting to the geographic, demographic, and physical needs of the population and highlights the emergence and importance of apps and telehealth. It also provides a high-level approach to managing pandemics by applying the various elements of the digital ecosystem. The book covers such technologies as: Computerized physician order entry (CPOE) Clinical Information Systems Alerting systems and medical sensors Electronic healthcare records (EHRs) Mobile healthcare and telehealth. Apps Business Intelligence and Decision Support Analytics Digital outreach to the population Artificial Intelligence The book then closes the loop on the efficiency enhancing process with a focus on utilizing analytics for problem solving for a variety of healthcare processes including the pharmaceutical sector. Finally, the book ends with current and futuristic views on evolving applications of AI throughout the industry.

Cloud Native Spring in Action: With Spring Boot and Kubernetes (Paperback): Thomas Vitale Cloud Native Spring in Action: With Spring Boot and Kubernetes (Paperback)
Thomas Vitale
R1,254 Discovery Miles 12 540 Ships in 12 - 17 working days

To really benefit from the reliability and scalability you get with cloud platforms, your applications need to be designed for that environment. Cloud Native Spring in Action is a practical guide for planning, designing, and building your first cloud native apps using the powerful, industry-standard Spring framework Cloud Native Spring in Action teaches you effective Spring and Kubernetes cloud development techniques that you can immediately apply to enterprise-grade applications. As you develop an online bookshop, you'll learn how to build and test a cloud native app with Spring, containerize it with Docker, and deploy it to the public cloud with Kubernetes. Including coverage of security, continuous delivery, and configuration, this hands-on guide is the perfect primer for navigating the increasingly complex cloud landscape. About the Technology Modern applications need scalability, resilience, reliability, and zero-downtime. For most large systems, that means you'll take advantage of cloud-based tools and services. For Java developers, Spring helps effortlessly build cloud native, production-ready applications. Combined with Kubernetes, the Spring ecosystem offers numerous built-in features to help out developers migrating or building new cloud native projects efficiently.

CEH v11 - Certified Ethical Hacker Version 11 Practice Tests (Paperback, 2nd Edition): R Messier CEH v11 - Certified Ethical Hacker Version 11 Practice Tests (Paperback, 2nd Edition)
R Messier
R700 Discovery Miles 7 000 Ships in 12 - 17 working days

Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Coverage aligns with CEH version 11, including material to test your knowledge of reconnaissance and scanning, cloud, tablet, and mobile and wireless security and attacks, the latest vulnerabilities, and the new emphasis on Internet of Things (IoT). The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable apply their knowledge and skills in a high-pressure test setting. The ideal companion for the Sybex CEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of an attacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 11 Practice Tests are the major preparation tool you should not be without.

Enabling Technologies for Next Generation Wireless Communications (Hardcover): Mohammed Usman, Mohd Wajid, Mohd Dilshad Ansari Enabling Technologies for Next Generation Wireless Communications (Hardcover)
Mohammed Usman, Mohd Wajid, Mohd Dilshad Ansari
R4,356 Discovery Miles 43 560 Ships in 12 - 17 working days

Enabling Technologies for Next Generation Wireless Communications provides up-to-date information on emerging trends in wireless systems, their enabling technologies and their evolving application paradigms. This book includes the latest trends and developments toward next generation wireless communications. It highlights the requirements of next generation wireless systems, limitations of existing technologies in delivering those requirements and the need to develop radical new technologies. It focuses on bringing together information on various technological developments that are enablers vital to fulfilling the requirements of future wireless communication systems and their applications. Topics discussed include spectrum issues, network planning, signal processing, transmitter, receiver, antenna technologies, channel coding, security and application of machine learning and deep learning for wireless communication systems. The book also provides information on enabling business models for future wireless systems. This book is useful as a resource for researchers and practitioners worldwide, including industry practitioners, technologists, policy decision-makers, academicians, and graduate students.

Privacy and Identity in a Networked Society - Refining Privacy Impact Assessment (Paperback): Stefan Strauss Privacy and Identity in a Networked Society - Refining Privacy Impact Assessment (Paperback)
Stefan Strauss
R1,275 Discovery Miles 12 750 Ships in 12 - 17 working days

This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age. Privacy is among the most endangered "species" in our networked society: personal information is processed for various purposes beyond our control. Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities inherent to digital technology reinforce this dilemma and benefit surveillance practices, thereby complicating the detection of privacy risks and the creation of appropriate safeguards. Easing this problem requires a novel approach to privacy impact assessment (PIA), and this book proposes an alternative PIA framework which, at its core, comprises a basic typology of (personally and technically) identifiable information. This approach contributes to the theoretical and practical understanding of privacy impacts and thus, to the development of more effective protection standards. This book will be of much interest to students and scholars of critical security studies, surveillance studies, computer and information science, science and technology studies, and politics.

Interoperability in IoT for Smart Systems (Hardcover): Monideepa Roy, Pushpendu Kar, Sujoy Datta Interoperability in IoT for Smart Systems (Hardcover)
Monideepa Roy, Pushpendu Kar, Sujoy Datta
R3,188 Discovery Miles 31 880 Ships in 12 - 17 working days

Exclusively covers interoperability of IoT systems in parallel with their use towards the development of smart systems Discusses the requirements of interoperability in smart IoT systems and their solutions Reviews IoT applications in different smart and intelligent systems Explores dealing with interoperability of heterogeneous participating devices Provides different case studies and open problems related to interoperability in IoT system

Toward Solving Complex Human Problems - Techniques for Increasing Our Understanding of What Matters in Doing So (Hardcover):... Toward Solving Complex Human Problems - Techniques for Increasing Our Understanding of What Matters in Doing So (Hardcover)
Brian E. White
R1,674 Discovery Miles 16 740 Ships in 12 - 17 working days

This book serves three basic purposes: (1) a tutorial-type reference for complex systems engineering (CSE) concepts and associated terminology, (2) a recommendation of a proposed methodology showing how the evolving practice of CSE can lead to a more unified theory, and (3) a complex systems (CSs) initiative for organizations to invest some of their resources toward helping to make the world a better place. A wide variety of technical practitioners-e.g., developers of new or improved systems (particularly systems engineers), program and project managers, associated staff/workers, funders and overseers, government executives, military officers, systems acquisition personnel, contract specialists, owners of large and small businesses, professional society members, and CS researchers-may be interested in further exploring these topics. Readers will learn more about CS characteristics and behaviors and CSE principles and will therefore be able to focus on techniques that will better serve them in their everyday work environments in dealing with complexity. The fundamental observation is that many systems inherently involve a deeper complexity because stakeholders are engaged in the enterprise. This means that such CSs are more difficult to invent, create, or improve upon because no one can be in total control since people cannot be completely controlled. Therefore, one needs to concentrate on trying to influence progress, then wait a suitable amount of time to see what happens, iterating as necessary. With just three chapters in this book, it seems to make sense to provide a tutorial introduction that readers can peruse only as necessary, considering their background and understanding, then a chapter laying out the suggested artifacts and methodology, followed by a chapter emphasizing worthwhile areas of application.

Trust and Records in an Open Digital Environment (Hardcover): Hrvoje Stancic Trust and Records in an Open Digital Environment (Hardcover)
Hrvoje Stancic
R3,926 Discovery Miles 39 260 Ships in 12 - 17 working days

Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.

Artificial Intelligence Techniques in IoT Sensor Networks (Hardcover): Mohamed Elhoseny, Mohamed Abdel-Basset, K Shankar Artificial Intelligence Techniques in IoT Sensor Networks (Hardcover)
Mohamed Elhoseny, Mohamed Abdel-Basset, K Shankar
R3,918 Discovery Miles 39 180 Ships in 12 - 17 working days

Artificial Intelligence Techniques in IoT Sensor Networks is a technical book which can be read by researchers, academicians, students and professionals interested in artificial intelligence (AI), sensor networks and Internet of Things (IoT). This book is intended to develop a shared understanding of applications of AI techniques in the present and near term. The book maps the technical impacts of AI technologies, applications and their implications on the design of solutions for sensor networks. This text introduces researchers and aspiring academicians to the latest developments and trends in AI applications for sensor networks in a clear and well-organized manner. It is mainly useful for research scholars in sensor networks and AI techniques. In addition, professionals and practitioners working on the design of real-time applications for sensor networks may benefit directly from this book. Moreover, graduate and master's students of any departments related to AI, IoT and sensor networks can find this book fascinating for developing expert systems or real-time applications. This book is written in a simple and easy language, discussing the fundamentals, which relieves the requirement of having early backgrounds in the field. From this expectation and experience, many libraries will be interested in owning copies of this work.

Foreign Direct Investment and Technological Change (Hardcover, illustrated edition): John Cantwell Foreign Direct Investment and Technological Change (Hardcover, illustrated edition)
John Cantwell
R13,953 Discovery Miles 139 530 Ships in 12 - 17 working days

This comprehensive new collection provides a careful selection of the major writings to have appeared in the field of foreign direct investment (FDI) and technological change since 1966. It has been prepared by one of the leading contributors and pioneers in this field, and is an area of research that has attracted a steady growth in interest over the last thirty years. After a new introduction which critically surveys the literature, the collection provides a comprehensive coverage that incorporates the early analysis of FDI and technology; the theoretical foundations of the analysis of technological change in multinational firms; theoretical models and empirical studies of technology transfer; the internationalization of technology creation; technology-based inter-company alliances; the co-evolution of FDI and technological development at country level; the geographical localization of the technological efforts of foreign-owned affiliates and technology spillovers between firms.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Designing Switch/Routers - Fundamental…
James Aweya Hardcover R8,620 Discovery Miles 86 200
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,493 R1,199 Discovery Miles 11 990
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,305 R1,172 Discovery Miles 11 720
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
CEH v12 Certified Ethical Hacker Study…
Ric Messier Paperback R1,327 Discovery Miles 13 270
Cloud Security For Dummies, 1st Edition
T. Coombs Paperback R629 Discovery Miles 6 290
Linux Command Line and Shell Scripting…
R. Blum Paperback R962 Discovery Miles 9 620
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
How I Rob Banks - And Other Such Places
F. C. Barker Hardcover R580 R412 Discovery Miles 4 120
Bankers Like Us - Dispatches from an…
Leda Glyptis Hardcover R977 Discovery Miles 9 770

 

Partners