0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (5)
  • R250 - R500 (27)
  • R500+ (2,732)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General

Designing Security Architecture Solutions (Paperback): J. Ramachandran Designing Security Architecture Solutions (Paperback)
J. Ramachandran
R2,010 R1,513 Discovery Miles 15 130 Save R497 (25%) Ships in 7 - 13 working days

The first guide to tackle security architecture at the software engineering level
Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security architecture from a software engineering perspective. He explains why strong security must be a guiding principle of the development process and identifies a common set of features found in most security products, explaining how they can and should impact the development cycle. The book also offers in-depth discussions of security technologies, cryptography, database security, application and operating system security, and more.

Green Internet of Things (Hardcover): Bandana Mahapatra, Anand Nayyar Green Internet of Things (Hardcover)
Bandana Mahapatra, Anand Nayyar
R1,531 Discovery Miles 15 310 Ships in 9 - 15 working days

Green Internet of Things (IoT) envisions the concept of reducing the energy consumption of IoT devices and making the environment safe. Considering this factor, this book focuses on both the theoretical and implementation aspects in green computing, next-generation networks or networks that can be utilized in providing green systems through IoT-enabling technologies, that is, the technology behind its architecture and building components. It also encompasses design concepts and related advanced computing in detail. * Highlights the elements and communication technologies in Green IoT * Discusses technologies, architecture and components surrounding Green IoT * Describes advanced computing technologies in terms of smart world, data centres and other related hardware for Green IoT * Elaborates energy-efficient Green IoT Design for real-time implementations * Covers pertinent applications in building smart cities, healthcare devices, efficient energy harvesting and so forth This short-form book is aimed at students, researchers in IoT, clean technologies, computer science and engineering cum Industry R&D researchers.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,414 Discovery Miles 14 140 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Probabilistic Data Structures for Blockchain-Based Internet of Things Applications (Hardcover): Neeraj Kumar, Arzoo Miglani Probabilistic Data Structures for Blockchain-Based Internet of Things Applications (Hardcover)
Neeraj Kumar, Arzoo Miglani
R3,918 Discovery Miles 39 180 Ships in 12 - 17 working days

This book covers theory and practical knowledge of Probabilistic data structures (PDS) and Blockchain (BC) concepts. It introduces the applicability of PDS in BC to technology practitioners and explains each PDS through code snippets and illustrative examples. Further, it provides references for the applications of PDS to BC along with implementation codes in python language for various PDS so that the readers can gain confidence using hands on experience. Organized into five sections, the book covers IoT technology, fundamental concepts of BC, PDS and algorithms used to estimate membership query, cardinality, similarity and frequency, usage of PDS in BC based IoT and so forth.

Software Engineering Practice - A Case Study Approach (Paperback): Thomas B. Hilburn, Massood Towhidnejad Software Engineering Practice - A Case Study Approach (Paperback)
Thomas B. Hilburn, Massood Towhidnejad
R2,076 Discovery Miles 20 760 Ships in 12 - 17 working days

This book is a broad discussion covering the entire software development lifecycle. It uses a comprehensive case study to address each topic and features the following: A description of the development, by the fictional company Homeowner, of the DigitalHome (DH) System, a system with "smart" devices for controlling home lighting, temperature, humidity, small appliance power, and security A set of scenarios that provide a realistic framework for use of the DH System material Just-in-time training: each chapter includes mini tutorials introducing various software engineering topics that are discussed in that chapter and used in the case study A set of case study exercises that provide an opportunity to engage students in software development practice, either individually or in a team environment. Offering a new approach to learning about software engineering theory and practice, the text is specifically designed to: Support teaching software engineering, using a comprehensive case study covering the complete software development lifecycle Offer opportunities for students to actively learn about and engage in software engineering practice Provide a realistic environment to study a wide array of software engineering topics including agile development Software Engineering Practice: A Case Study Approach supports a student-centered, "active" learning style of teaching. The DH case study exercises provide a variety of opportunities for students to engage in realistic activities related to the theory and practice of software engineering. The text uses a fictitious team of software engineers to portray the nature of software engineering and to depict what actual engineers do when practicing software engineering. All the DH case study exercises can be used as team or group exercises in collaborative learning. Many of the exercises have specific goals related to team building and teaming skills. The text also can be used to support the professional development or certification of practicing software engineers. The case study exercises can be integrated with presentations in a workshop or short course for professionals.

From Computing to Computational Thinking (Paperback): Paul S. Wang From Computing to Computational Thinking (Paperback)
Paul S. Wang
R2,058 Discovery Miles 20 580 Ships in 12 - 17 working days

Computational Thinking (CT) involves fundamental concepts and reasoning, distilled from computer science and other computational sciences, which become powerful general mental tools for solving problems, increasing efficiency, reducing complexity, designing procedures, or interacting with humans and machines. An easy-to-understand guidebook, From Computing to Computational Thinking gives you the tools for understanding and using CT. It does not assume experience or knowledge of programming or of a programming language, but explains concepts and methods for CT with clarity and depth. Successful applications in diverse disciplines have shown the power of CT in problem solving. The book uses puzzles, games, and everyday examples as starting points for discussion and for connecting abstract thinking patterns to real-life situations. It provides an interesting and thought-provoking way to gain general knowledge about modern computing and the concepts and thinking processes underlying modern digital technologies.

Embedded Software Development for Safety-Critical Systems (Hardcover): Chris Hobbs Embedded Software Development for Safety-Critical Systems (Hardcover)
Chris Hobbs
R3,632 Discovery Miles 36 320 Ships in 12 - 17 working days

"I highly recommend Mr. Hobbs' book." - Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com Safety-critical devices, whether medical, automotive, or industrial, are increasingly dependent on the correct operation of sophisticated software. Many standards have appeared in the last decade on how such systems should be designed and built. Developers, who previously only had to know how to program devices for their industry, must now understand remarkably esoteric development practices and be prepared to justify their work to external auditors. Embedded Software Development for Safety-Critical Systems discusses the development of safety-critical systems under the following standards: IEC 61508; ISO 26262; EN 50128; and IEC 62304. It details the advantages and disadvantages of many architectural and design practices recommended in the standards, ranging from replication and diversification, through anomaly detection to the so-called "safety bag" systems. Reviewing the use of open-source components in safety-critical systems, this book has evolved from a course text used by QNX Software Systems for a training module on building embedded software for safety-critical devices, including medical devices, railway systems, industrial systems, and driver assistance devices in cars. Although the book describes open-source tools for the most part, it also provides enough information for you to seek out commercial vendors if that's the route you decide to pursue. All of the techniques described in this book may be further explored through hundreds of learned articles. In order to provide you with a way in, the author supplies references he has found helpful as a working software developer. Most of these references are available to download for free.

Virtual Aesthetics in Architecture - Designing in Mixed Realities (Paperback): Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou Virtual Aesthetics in Architecture - Designing in Mixed Realities (Paperback)
Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou
R1,182 Discovery Miles 11 820 Ships in 12 - 17 working days

- Explores how mixed, virtual and augmented reality technologies can enable designers to create immersive experiences and expand the aesthetic potential of the medium - Curated selection of projects and essays by leading international architects and designers, including those from Zaha Hadid Architects and MVRDV- Illustrated with over 150 images

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP - Scalable... Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP - Scalable Distributed Applications and Media Control over Internet (Hardcover)
Radhika Ranjan Roy
R5,503 Discovery Miles 55 030 Ships in 12 - 17 working days

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.

Virtual Aesthetics in Architecture - Designing in Mixed Realities (Hardcover): Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou Virtual Aesthetics in Architecture - Designing in Mixed Realities (Hardcover)
Sara Eloy, Anette Kreutzberg, Ioanna Symeonidou
R4,073 Discovery Miles 40 730 Ships in 12 - 17 working days

- Explores how mixed, virtual and augmented reality technologies can enable designers to create immersive experiences and expand the aesthetic potential of the medium - Curated selection of projects and essays by leading international architects and designers, including those from Zaha Hadid Architects and MVRDV- Illustrated with over 150 images

Open Systems Dependability - Dependability Engineering for Ever-Changing Systems, Second Edition (Hardcover, 2nd edition):... Open Systems Dependability - Dependability Engineering for Ever-Changing Systems, Second Edition (Hardcover, 2nd edition)
Mario Tokoro
R3,046 Discovery Miles 30 460 Ships in 12 - 17 working days

The book describes a fundamentally new approach to software dependability, considering a software system as an ever-changing system due to changes in service objectives, users' requirements, standards and regulations, and to advances in technology. Such a system is viewed as an Open System since its functions, structures, and boundaries are constantly changing. Thus, the approach to dependability is called Open Systems Dependability. The DEOS technology realizes Open Systems Dependability. It puts more emphasis on stakeholders' agreement and accountability achievement for business/service continuity than in elemental technologies.

Multisensor Data Fusion - From Algorithms and Architectural Design to Applications (Hardcover): Hassen Fourati Multisensor Data Fusion - From Algorithms and Architectural Design to Applications (Hardcover)
Hassen Fourati
R4,707 Discovery Miles 47 070 Ships in 12 - 17 working days

Multisensor Data Fusion: From Algorithms and Architectural Design to Applications covers the contemporary theory and practice of multisensor data fusion, from fundamental concepts to cutting-edge techniques drawn from a broad array of disciplines. Featuring contributions from the world's leading data fusion researchers and academicians, this authoritative book: Presents state-of-the-art advances in the design of multisensor data fusion algorithms, addressing issues related to the nature, location, and computational ability of the sensors Describes new materials and achievements in optimal fusion and multisensor filters Discusses the advantages and challenges associated with multisensor data fusion, from extended spatial and temporal coverage to imperfection and diversity in sensor technologies Explores the topology, communication structure, computational resources, fusion level, goals, and optimization of multisensor data fusion system architectures Showcases applications of multisensor data fusion in fields such as medicine, transportation's traffic, defense, and navigation Multisensor Data Fusion: From Algorithms and Architectural Design to Applications is a robust collection of modern multisensor data fusion methodologies. The book instills a deeper understanding of the basics of multisensor data fusion as well as a practical knowledge of the problems that can be faced during its execution.

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,535 Discovery Miles 15 350 Ships in 12 - 17 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

TensorFlow 2.0 in Action (Paperback): Thushan Ganegedara TensorFlow 2.0 in Action (Paperback)
Thushan Ganegedara
R1,296 Discovery Miles 12 960 Ships in 12 - 17 working days

TensorFlow is a one-stop solution for building, monitoring, optimizing,and deploying your models. This practical guide to building deep learning models with the new features of TensorFlow 2.0is filled with engaging projects, simple language, and coverage of the latest algorithms. TensorFlow 2.0 in Action teaches you to use the new features of TensorFlow 2.0 to create advanced deep learning models. You'll learn by building hands-on projects including an image classifier that can recognize objects, a French-to-English machine translator, and even a neural network that can write fiction. You'll dive into the details of modern deep learning techniques including both transformer and attention models, and learn how pretrained models can solve your tricky data science- problems. TensorFlow is the go-to framework for putting deep learning into production. Created by Google, this ground breaking tool handles repetitive low-level operations and frees you up to focus on innovating your AIs.TensorFlow encompasses almost every element of a deep learning pipeline-aone-stop solution for building, monitoring, optimizing, and deploying your models.

The Green Computing Book - Tackling Energy Efficiency at Large Scale (Paperback): Wu-chun Feng The Green Computing Book - Tackling Energy Efficiency at Large Scale (Paperback)
Wu-chun Feng
R1,431 Discovery Miles 14 310 Ships in 12 - 17 working days

State-of-the-Art Approaches to Advance the Large-Scale Green Computing Movement Edited by one of the founders and lead investigator of the Green500 list, The Green Computing Book: Tackling Energy Efficiency at Large Scale explores seminal research in large-scale green computing. It begins with low-level, hardware-based approaches and then traverses up the software stack with increasingly higher-level, software-based approaches. In the first chapter, the IBM Blue Gene team illustrates how to improve the energy efficiency of a supercomputer by an order of magnitude without any system performance loss in parallelizable applications. The next few chapters explain how to enhance the energy efficiency of a large-scale computing system via compiler-directed energy optimizations, an adaptive run-time system, and a general prediction performance framework. The book then explores the interactions between energy management and reliability and describes storage system organization that maximizes energy efficiency and reliability. It also addresses the need for coordinated power control across different layers and covers demand response policies in computing centers. The final chapter assesses the impact of servers on data center costs.

Computer Architecture - Fundamentals and Principles of Computer Design, Second Edition (Paperback, 2nd edition): Joseph D.... Computer Architecture - Fundamentals and Principles of Computer Design, Second Edition (Paperback, 2nd edition)
Joseph D. Dumas II
R1,841 Discovery Miles 18 410 Ships in 12 - 17 working days

Not only does almost everyone in the civilized world use a personal computer, smartphone, and/or tablet on a daily basis to communicate with others and access information, but virtually every other modern appliance, vehicle, or other device has one or more computers embedded inside it. One cannot purchase a current-model automobile, for example, without several computers on board to do everything from monitoring exhaust emissions, to operating the anti-lock brakes, to telling the transmission when to shift, and so on. Appliances such as clothes washers and dryers, microwave ovens, refrigerators, etc. are almost all digitally controlled. Gaming consoles like Xbox, PlayStation, and Wii are powerful computer systems with enhanced capabilities for user interaction. Computers are everywhere, even when we don't see them as such, and it is more important than ever for students who will soon enter the workforce to understand how they work. This book is completely updated and revised for a one-semester upper level undergraduate course in Computer Architecture, and suitable for use in an undergraduate CS, EE, or CE curriculum at the junior or senior level. Students should have had a course(s) covering introductory topics in digital logic and computer organization. While this is not a text for a programming course, the reader should be familiar with computer programming concepts in at least one language such as C, C++, or Java. Previous courses in operating systems, assembly language, and/or systems programming would be helpful, but are not essential.

Enterprise Level Security 1 & 2 (Hardcover): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Hardcover)
Kevin Foltz, William R. Simpson
R3,174 Discovery Miles 31 740 Ships in 12 - 17 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover): T. Ananth Kumar, T. S. Arun Samuel, R.... Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover)
T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy
R3,555 Discovery Miles 35 550 Ships in 9 - 15 working days

This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

Optical Networks and Components - Fundamentals and Advances (Hardcover): Partha Pratim Sahu Optical Networks and Components - Fundamentals and Advances (Hardcover)
Partha Pratim Sahu
R6,106 Discovery Miles 61 060 Ships in 12 - 17 working days

Intended as an undergraduate/post graduate level textbook for courses on high speed optical networks as well as computer networks. Nine chapters cover basic principles of the technology and different devices for optical networks, as well as processing of integrated waveguide devices of optical networks using different technologies. It provides students, researchers and practicing engineers with an expert guide to the fundamental concepts, issues and state of the art developments in optical networks. Includes examples throughout all the chapters of the book to aid understanding of basic problems and solutions.

Programming for Hybrid Multi/Manycore MPP Systems (Paperback): John Levesque, Aaron Vose Programming for Hybrid Multi/Manycore MPP Systems (Paperback)
John Levesque, Aaron Vose
R1,413 Discovery Miles 14 130 Ships in 12 - 17 working days

"Ask not what your compiler can do for you, ask what you can do for your compiler." --John Levesque, Director of Cray's Supercomputing Centers of Excellence The next decade of computationally intense computing lies with more powerful multi/manycore nodes where processors share a large memory space. These nodes will be the building block for systems that range from a single node workstation up to systems approaching the exaflop regime. The node itself will consist of 10's to 100's of MIMD (multiple instruction, multiple data) processing units with SIMD (single instruction, multiple data) parallel instructions. Since a standard, affordable memory architecture will not be able to supply the bandwidth required by these cores, new memory organizations will be introduced. These new node architectures will represent a significant challenge to application developers. Programming for Hybrid Multi/Manycore MPP Systems attempts to briefly describe the current state-of-the-art in programming these systems, and proposes an approach for developing a performance-portable application that can effectively utilize all of these systems from a single application. The book starts with a strategy for optimizing an application for multi/manycore architectures. It then looks at the three typical architectures, covering their advantages and disadvantages. The next section of the book explores the other important component of the target-the compiler. The compiler will ultimately convert the input language to executable code on the target, and the book explores how to make the compiler do what we want. The book then talks about gathering runtime statistics from running the application on the important problem sets previously discussed. How best to utilize available memory bandwidth and virtualization is covered next, along with hybridization of a program. The last part of the book includes several major applications, and examines future hardware advancements and how the application developer may prepare for those advancements.

Advances in Mobile Computing and Communications - Perspectives and Emerging Trends in 5G Networks (Paperback): M. Bala Krishna,... Advances in Mobile Computing and Communications - Perspectives and Emerging Trends in 5G Networks (Paperback)
M. Bala Krishna, Jaime Lloret Mauri
R1,486 Discovery Miles 14 860 Ships in 12 - 17 working days

By 2020, if not before, mobile computing and wireless systems are expected to enter the fifth generation (5G), which promises evolutionary if not revolutionary services. What those advanced services will look like, sound like, and feel like is the theme of the book Advances in Mobile Computing and Communications: Perspectives and Emerging Trends in 5G Networks. The book explores futuristic and compelling ideas in latest developments of communication and networking aspects of 5G. As such, it serves as an excellent guide for advanced developers, communication network scientists, researchers, academicians, and graduate students. The authors address computing models, communication architecture, and protocols based on 3G, LTE, LTE-A, 4G, and beyond. Topics include advances in 4G, radio propagation and channel modeling aspects of 4G networks, limited feedback for 4G, and game theory application for power control and subcarrier allocation in OFDMA cellular networks. Additionally, the book covers millimeter-wave technology for 5G networks, multicellular heterogeneous networks, and energy-efficient mobile wireless network operations for 4G and beyond using HetNets. Finally, the authors delve into opportunistic multiconnect networks with P2P WiFi and cellular providers and video streaming over wireless channels for 4G and beyond.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,368 Discovery Miles 13 680 Ships in 12 - 17 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

The Future X Network - A Bell Labs Perspective (Paperback): Marcus K. Weldon The Future X Network - A Bell Labs Perspective (Paperback)
Marcus K. Weldon
R1,449 Discovery Miles 14 490 Ships in 12 - 17 working days

We are at the dawn of an era in networking that has the potential to define a new phase of human existence. This era will be shaped by the digitization and connection of everything and everyone with the goal of automating much of life, effectively creating time by maximizing the efficiency of everything we do and augmenting our intelligence with knowledge that expedites and optimizes decision-making and everyday routines and processes. The Future X Network: A Bell Labs Perspective outlines how Bell Labs sees this future unfolding and the key technological breakthroughs needed at both the architectural and systems levels. Each chapter of the book is dedicated to a major area of change and the network and systems innovation required to realize the technological revolution that will be the essential product of this new digital future.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (Paperback): B Dang Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (Paperback)
B Dang
R1,191 R998 Discovery Miles 9 980 Save R193 (16%) Ships in 7 - 13 working days

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. * Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples * Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques * Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step * Demystifies topics that have a steep learning curve * Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.

Artificial Intelligence and Cybersecurity - Advances and Innovations (Hardcover): Ishaani Priyadarshini, Rohit Sharma Artificial Intelligence and Cybersecurity - Advances and Innovations (Hardcover)
Ishaani Priyadarshini, Rohit Sharma
R4,551 Discovery Miles 45 510 Ships in 9 - 15 working days

Provides advanced system implementation for Smart Cities using Artificial Intelligence Addresses the complete functional framework workflow in Artificial Intelligence Explores basic and high-level concepts, thus servicing as a manual for those in the industry while also helping beginners Based on the latest technologies, and covering the major challenges, issues, and advances in Artificial Intelligence and Cybersecurity Discusses intelligent data management and automated systems through Artificial Intelligence and Cyber Security

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Edge-AI in Healthcare - Trends and…
Sonali Vyas, Akanksha Upadhyaya, … Hardcover R2,593 Discovery Miles 25 930
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,394 Discovery Miles 13 940
Understanding Users - Designing…
Andrew Dillon Paperback R954 Discovery Miles 9 540
The Adventurous and Practical Journey to…
FANAP Studies & Research Center Hardcover R2,971 Discovery Miles 29 710
Discoverability in Digital Repositories…
Liz Woolcott, Ali Shiri Paperback R953 Discovery Miles 9 530
Asynchronous On-Chip Networks and…
Wei Song, Guangda Zhang Hardcover R2,355 Discovery Miles 23 550
The TOGAF standard, version 9.2
Open Group Paperback R2,250 Discovery Miles 22 500
Dual Quaternions and Their Associated…
Ronald Goldman Hardcover R4,184 Discovery Miles 41 840
The Architecture of Computer Hardware…
I Englander Paperback R4,164 R662 Discovery Miles 6 620
The Auditor's Guide to Blockchain…
Shaun Aghili Hardcover R2,993 Discovery Miles 29 930

 

Partners