0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (5)
  • R250 - R500 (24)
  • R500+ (2,736)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design > General

Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform (Paperback): Rosemary Wang Infrastructure as Code, Patterns and Practices: With examples in Python and Terraform (Paperback)
Rosemary Wang
R1,241 Discovery Miles 12 410 Ships in 12 - 17 working days

Essential Infrastructure as Code teaches patterns for scaling systems and supporting infrastructure for mission-critical applications. The book is fullof flexible automation techniques and universal principles that are easy toapply to almost any use case, from data centers, to public cloud, to software-as-a-Service. The book is full of techniques that work whether you're managing your personal projects or making live network changes across a large enterprise. Infrastructure as Code (IaC) replaces time-consuming manual provisioning and configuration with automation via configuration managers or provisioning tools like Hashicorp Terraform. Managing your infrastructure as code makes it easy to test changes and implement new features, scale systems without downtime or operational toil, and rapidly roll back mistakes.

Essentials of Computer Architecture (Paperback, 2nd edition): Douglas Comer Essentials of Computer Architecture (Paperback, 2nd edition)
Douglas Comer
R1,458 Discovery Miles 14 580 Ships in 9 - 15 working days

This easy to read textbook provides an introduction to computer architecture, while focusing on the essential aspects of hardware that programmers need to know. The topics are explained from a programmer's point of view, and the text emphasizes consequences for programmers. Divided in five parts, the book covers the basics of digital logic, gates, and data paths, as well as the three primary aspects of architecture: processors, memories, and I/O systems. The book also covers advanced topics of parallelism, pipelining, power and energy, and performance. A hands-on lab is also included. The second edition contains three new chapters as well as changes and updates throughout.

BTEC National for IT Practitioners: Systems units - Core and Specialist Units for the Systems Support Pathway (Hardcover):... BTEC National for IT Practitioners: Systems units - Core and Specialist Units for the Systems Support Pathway (Hardcover)
Sharon Yull
R5,331 Discovery Miles 53 310 Ships in 12 - 17 working days

BTEC National for IT Practitioners: Systems Units has been written specifically to cover the systems pathway of the BTEC National specifications. This book caters for one of the most popular pathways in the BTEC National specifications, bringing together all the key specialist units for students who have chosen the systems route, including the core units specific to this pathway that aren't covered in the core unit book. When used alongside its companions for the core units and business pathways, this series delivers the most accessible and usable student textbooks available for the BTEC National. Units covered: Unit 11 - Data Analysis and Design Unit 22 - Network Management Unit 13 - Human Computer Interaction Unit 28 - IT Technical Support Unit 16 - Maintaining Computer Systems Unit 29 - IT Systems Troubleshooting and Repair Written by an experienced tutor, each unit is illustrated with assessment activities, end-of-chapter questions, case studies and practical exercises. The result is a clear, straightforward textbook that encourages independent study and acts as a reference to various topics within the qualification.

Handbook of Communications Systems Management - 1999 Edition (Hardcover): Gilbert Held Handbook of Communications Systems Management - 1999 Edition (Hardcover)
Gilbert Held
R9,203 Discovery Miles 92 030 Ships in 12 - 17 working days

As a manager of the 90s, you know that IT departments like your own must continue to meet increasingly sophisticated end-user needs despite highly limited resources. Learn when it s best to farm out work to consultants, when to reserve internal resources for other tasks, and how best to use your in-house staff. Coverage unlike any other in the marketplace. Written by 41 experts all practitioners in the networking and IS management fields this guidebook provides unique depth and scope. In this Third Edition, you ll find all new material that clearly outlines today s hottest issues. Prepares you to quickly respond to management requirements. Are you aware of the latest on strategic planning, systems planning, and points-of-failure planning? Have you linked your IT architecture and business plans? Have you updated senior management as to how IT can help achieve corporate goals? Do you have a corporate technology plan? Turn to the Handbook for all this and more. Now you can get up to speed on the latest in client/server, on how to give your end users faster and greater access to corporate data at a lower cost, and on how to quantify the amount of network support that this improvement will require? The Handbook was written with you in mind. The perfect resource for today s successful communications systems manager. This comprehensive, highly authoritative reference is designed to help you select, maintain, and manage your communications systems. It provides all the tools you need to evaluate, formulate, and implement effective communications network strategies to keep pace with today s rapidly changing technology. You get illustrations, tables, and diagrams to clearly outline and guide you the entire way. Be aware of the latest technologies and their impact on you. Keep costs down by aiding your thinking through all the systems and network elements from concept through implementation and day-to-day operation.

Handbook of Server Management and Administration - 1999 (Hardcover): Kristin B. Marks Handbook of Server Management and Administration - 1999 (Hardcover)
Kristin B. Marks
R7,629 Discovery Miles 76 290 Ships in 12 - 17 working days

Servers are the heart of the network. The Handbook of Server Management and Administration keeps you up-to-date with the very latest server technology and gives you the tools you need to choose, configure and maintain a server that will serve users, data streams and corporate goals with equal efficiency. The practical tips and case studies you'll find in the Handbook include detailed explanations of: the case for mainframe servers in the enterprise server installation considerations server security policies server data bus standards migrating to NetWare 4.1 and Novell Directory Services Windows NT Workstation vs. Server 4.0 UNIX as an application server fax servers Internet e-mail servers the art of placing images and multimedia on the corporate network and more! The contributing authors to the Handbook of Server Management and Administration are industry experts. Some work at corporations that have designed innovative solutions. Some wear battle scars from the field. Many are experienced writers and public speakers. All of them know what they're talking about. These leading authorities give you a wealth of practical advice, tips and strategies on how to: evaluate anti-virus solutions within distributed environments set up fault tolerance protection and RAID technology for networks choose the best network data and storage management techniques

Parallel Supercomputing in MIMD Architectures (Hardcover): R.Michael Hord Parallel Supercomputing in MIMD Architectures (Hardcover)
R.Michael Hord
R7,312 Discovery Miles 73 120 Ships in 12 - 17 working days

Parallel Supercomputing in MIMD Architectures is devoted to supercomputing on a wide variety of Multiple-Instruction-Multiple-Data (MIMD)-class parallel machines. This book describes architectural concepts, commercial and research hardware implementations, major programming concepts, algorithmic methods, representative applications, and benefits and drawbacks. Commercial machines described include Connection Machine 5, NCUBE, Butterfly, Meiko, Intel iPSC, iPSC/2 and iWarp, DSP3, Multimax, Sequent, and Teradata. Research machines covered include the J-Machine, PAX, Concert, and ASP. Operating systems, languages, translating sequential programs to parallel, and semiautomatic parallelizing are aspects of MIMD software addressed in Parallel Supercomputing in MIMD Architectures. MIMD issues such as scalability, partitioning, processor utilization, and heterogenous networks are discussed as well.This book is packed with important information and richly illustrated with diagrams and tables, Parallel Supercomputing in MIMD Architectures is an essential reference for computer professionals, program managers, applications system designers, scientists, engineers, and students in the computer sciences.

Telecommunications and Networking (Hardcover): Udo W. Pooch Telecommunications and Networking (Hardcover)
Udo W. Pooch
R8,232 Discovery Miles 82 320 Ships in 12 - 17 working days

As the dividing line between traditional computing science and telecommunications quickly becomes blurred or disappears in today's rapidly changing environment, there is an increasing need for computer professionals to possess knowledge of telecommunications principles. Telecommunications and Networking presents a comprehensive overview of the interaction and relationship between telecommunications and data processing. The book's early chapters cover basic telecommunications vocabulary, common nomenclature, telecommunications fundamentals, as well as the important relationships among coding, error detection and correction, and noise. Later chapters discuss such topics as switching, timing, topological structures, routing algorithms, and teleprocessing. Other topics covered in detail include specific concerns inherent to computer communications, such as protocols, error detection and correction, network monitoring and security, and system validation. System designers and programmers can no longer be effective simply by understanding the tradeoffs between hardware and software. Telecommunications and Networking provides both computing professionals and students the fundamental computer communications concepts necessary to function in today's computer industry.

The Network Manager's Handbook - 1999 (Hardcover): John Lusa The Network Manager's Handbook - 1999 (Hardcover)
John Lusa
R7,637 Discovery Miles 76 370 Ships in 12 - 17 working days

This essential handbook for the data communications/network manager and planner covers a variety of data communication and IS topics. The Network Manager's Handbook addresses technical issues associated with local and wide area networking, purchasing communications services, supporting the network's users, understanding the telecommunications regulatory environment, personnel issues, and more.

Simulation of Local Area Networks (Hardcover): Matthew N.O Sadiku Simulation of Local Area Networks (Hardcover)
Matthew N.O Sadiku
R5,488 Discovery Miles 54 880 Ships in 12 - 17 working days

A fast-growing area in the communications industry is the internetworking of an ever-increasing proliferation of computers, particularly via local area networks (LANs). The LAN is a resource-sharing data communications network being used by many offices to interchange information such as electronic mail, word processing, and files among computers and other devices. This unique book shows the user how to establish the performance characteristics of a LAN before putting it to use in a particular type of situation. Simulation of Local Area Networks consists of eight chapters, each with its own extensive list of references. The first chapter provides a brief review of local area networks, and the second chapter gives the analytical models of popular LANs-token-passing bus and ring networks, CSMA/CD LANs, and star networks. Chapter 3 covers general principles of simulation, and Chapter 4 discusses fundamental concepts in probability and statistics relating to simulation modeling. Materials in Chapters 3 and 4 are specifically applied in developing simulation models on token-passing LANs, CSMA/CD LANs, and star LANs in Chapters 5 through 7. The computer code in Chapters 5, 6, and 7 is divided into segments, and a detailed explanation of each segment is provided. The last chapter reviews special-purpose languages such as GPSS, SIMSCRIPT, GASP, SIMULA, SLAM, and RESQ. Helpful criteria for language selection are included. The entire code is put together in the appendixes. This book has two major advantages over existing texts. First, it uses C, a well-developed general-purpose language that is familiar to most analysts. Second, the text specifically applies the simulation principles to local area networks. No other book available shows the systems analyst how to evaluate the performance of existing or proposed systems under different kinds of conditions.

Piezoelectric Materials and Devices - Applications in Engineering and Medical Sciences (Paperback): M.S. Vijaya Piezoelectric Materials and Devices - Applications in Engineering and Medical Sciences (Paperback)
M.S. Vijaya
R2,339 Discovery Miles 23 390 Ships in 12 - 17 working days

Piezoelectric Materials and Devices: Applications in Engineering and Medical Sciences provides a complete overview of piezoelectric materials, covering all aspects of the materials starting from fundamental concepts. The treatment includes physics of piezoelectric materials, their characteristics and applications. The author uses simple language to explain the theory of piezoelectricity and introduce readers to the properties and design of different types of piezoelectric materials, such as those used in engineering and medical device applications. This book: Introduces various types of dielectrics and their classification based on their characteristics Addresses the mathematical formulation of piezoelectric effects and the definition of various piezoelectric constants Describes the structure and properties of practical piezoelectric materials such as quartz, lead zirconate titanate, barium titanate, zinc oxide, and polyvinylidene fluoride Covers the entire gamut of piezoelectric devices used in engineering and medical applications Discusses briefly the use of piezoelectric materials for energy harvesting and structural health monitoring Explores new developments in biomedical applications of piezoelectric devices such as drug delivery, blood flow and blood pressure monitoring, robotic operating tools, etc. Elaborates on design and virtual prototyping of piezoelectric devices through the use of FE software tools ANSYS and PAFEC Giving design engineers, scientists, and technologists the information and guidance they will need to adopt piezoelectric materials in the development of smart devices, this book will also motivate engineering and science students to initiate new research for developing innovative devices. Its contents will be invaluable to both students and professionals seeking a greater understanding of fundamentals and applications in the evolving field of piezoelectrics.

Principles of Synchronous Digital Hierarchy (Paperback): Rajesh Kumar Jain Principles of Synchronous Digital Hierarchy (Paperback)
Rajesh Kumar Jain
R2,236 Discovery Miles 22 360 Ships in 12 - 17 working days

The book presents the current standards of digital multiplexing, called synchronous digital hierarchy, including analog multiplexing technologies. It is aimed at telecommunication professionals who want to develop an understanding of digital multiplexing and synchronous digital hierarchy, in particular, and the functioning of practical telecommunication systems, in general. The text includes all relevant fundamentals and provides a handy reference for problem solving or defining operations and maintenance strategies. The author covers digital conversion and TDM principles, line coding and digital modulation, signal impairments, and synchronization, as well as emerging systems.

Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover): Gilbert Held Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Gilbert Held
R4,915 Discovery Miles 49 150 Ships in 12 - 17 working days

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your

Introduction to Scientific and Technical Computing (Hardcover): Frank T. Willmore, Eric Jankowski, Coray Colina Introduction to Scientific and Technical Computing (Hardcover)
Frank T. Willmore, Eric Jankowski, Coray Colina
R5,202 Discovery Miles 52 020 Ships in 12 - 17 working days

Created to help scientists and engineers write computer code, this practical book addresses the important tools and techniques that are necessary for scientific computing, but which are not yet commonplace in science and engineering curricula. This book contains chapters summarizing the most important topics that computational researchers need to know about. It leverages the viewpoints of passionate experts involved with scientific computing courses around the globe and aims to be a starting point for new computational scientists and a reference for the experienced. Each contributed chapter focuses on a specific tool or skill, providing the content needed to provide a working knowledge of the topic in about one day. While many individual books on specific computing topics exist, none is explicitly focused on getting technical professionals and students up and running immediately across a variety of computational areas.

Telecommunications Cost Management (Hardcover): Brian Dimarsico, Thomas Phelps IV, William A. Yarberry Jr. Telecommunications Cost Management (Hardcover)
Brian Dimarsico, Thomas Phelps IV, William A. Yarberry Jr.
R4,910 Discovery Miles 49 100 Ships in 12 - 17 working days

Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to networking managers and administrators, is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide, The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to advanced topics in subnetting, network address translation, and configuring workstations, servers and routers. The book contains network tools that prepare you for testing and troubleshooting and highlights the need for techniques that conserve the use of IP addressing as well as the creation of a next generation IP addressing structure. While structured on a chapter by chapter basis, wherever possible each chapter was written to be independent, making the book convenient and easy to use in a hectic work environment. While you may find it possible to design a network or configure a workstation to operate without a detailed knowledge of IP addressing, the end results are not very efficient. And in the quickly changing global business environment, inefficiency wastes your time and money, both valuable resources for gaining and maintaining the competitive edge. With The ABCs of IP Addressing you get the comprehensive coverage of applications and protocols that help you do your job faster and more effectively.

Computer Architecture - Software Aspects, Coding, and Hardware (Hardcover): John Y. Hsu Computer Architecture - Software Aspects, Coding, and Hardware (Hardcover)
John Y. Hsu
R2,300 Discovery Miles 23 000 Ships in 10 - 15 working days

With the new developments in computer architecture, fairly recent publications can quickly become outdated. Computer Architecture: Software Aspects, Coding, and Hardware takes a modern approach. This comprehensive, practical text provides that critical understanding of a central processor by clearly detailing fundamentals, and cutting edge design features. With its balanced software/hardware perspective and its description of Pentium processors, the book allows readers to acquire practical PC software experience. The text presents a foundation-level set of ideas, design concepts, and applications that fully meet the requirements of computer organization and architecture courses.

The book features a "bottom up" computer design approach, based upon the author's thirty years experience in both academe and industry. By combining computer engineering with electrical engineering, the author describes how logic circuits are designed in a CPU. The extensive coverage of a micprogrammed CPU and new processor design features gives the insight of current computer development.

Computer Architecture: Software Aspects, Coding, and Hardware presents a comprehensive review of the subject, from beginner to advanced levels. Topics include:


o Two's complement numbers o Integer overflow
o Exponent overflow and underflow o Looping
o Addressing modes o Indexing
o Subroutine linking o I/O structures
o Memory mapped I/O o Cycle stealing
o Interrupts o Multitasking
o Microprogrammed CPU o Multiplication tree
o Instruction queue o Multimedia instructions
o Instruction cache o Virtual memory
o Data cache o Alpha chip
o Interprocessor communications o Branch prediction
o Speculative loading o Register stack
o JAVA virtual machine o Stack machine principles

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,198 Discovery Miles 51 980 Ships in 12 - 17 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

The End of Error - Unum Computing (Hardcover): John L. Gustafson The End of Error - Unum Computing (Hardcover)
John L. Gustafson
R5,520 Discovery Miles 55 200 Ships in 12 - 17 working days

The Future of Numerical Computing Written by one of the foremost experts in high-performance computing and the inventor of Gustafson's Law, The End of Error: Unum Computing explains a new approach to computer arithmetic: the universal number (unum). The unum encompasses all IEEE floating-point formats as well as fixed-point and exact integer arithmetic. This new number type obtains more accurate answers than floating-point arithmetic yet uses fewer bits in many cases, saving memory, bandwidth, energy, and power. A Complete Revamp of Computer Arithmetic from the Ground Up Richly illustrated in color, this groundbreaking book represents a fundamental change in how to perform calculations automatically. It illustrates how this novel approach can solve problems that have vexed engineers and scientists for decades, including problems that have been historically limited to serial processing. Suitable for Anyone Using Computers for Calculations The book is accessible to anyone who uses computers for technical calculations, with much of the book only requiring high school math. The author makes the mathematics interesting through numerous analogies. He clearly defines jargon and uses color-coded boxes for mathematical formulas, computer code, important descriptions, and exercises.

CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover): Boisy G Pitre, Bill Loguidice CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover)
Boisy G Pitre, Bill Loguidice
R5,487 Discovery Miles 54 870 Ships in 12 - 17 working days

CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,898 Discovery Miles 48 980 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,966 Discovery Miles 49 660 Ships in 12 - 17 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Network and Application Security - Fundamentals and Practices (Hardcover): Debashis Ganguly Network and Application Security - Fundamentals and Practices (Hardcover)
Debashis Ganguly
R5,480 Discovery Miles 54 800 Ships in 12 - 17 working days

To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners and industry practitioners, this book develops a concrete outlook, providing readers with basic concepts and an awareness of industry standards and best practices. Chapters address cryptography and network security, system-level security, and applications for network security. The book also examines application level attacks, practical software security, and securing application-specific networks. Ganguly Debashis speaks about Network and Application Security

Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover): Jesse Varsalone,... Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover)
Jesse Varsalone, Matthew McFadden
R5,518 Discovery Miles 55 180 Ships in 12 - 17 working days

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate u

Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover): Preston Deguise Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover)
Preston Deguise
R4,907 Discovery Miles 49 070 Ships in 12 - 17 working days

The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the

Software Mistakes and Tradeoffs (Paperback): Tomasz Lelek, Jon Skeet Software Mistakes and Tradeoffs (Paperback)
Tomasz Lelek, Jon Skeet
R1,059 Discovery Miles 10 590 Ships in 12 - 17 working days

In Software Mistakes and Tradeoffs you'll learn from costly mistakes that Tomasz Lelek and Jon Skeet have encountered over their impressive careers. You'll explore real-world scenarios where poor understanding of tradeoffs lead to major problems down the road, to help you make better design decisions. Plus, with a little practice, you'll be able to avoid the pitfalls that trip up even the most experienced developers. Software Mistakes and Tradeoffs teaches you how to make better decisions about designing, planning, and implementing applications. You'll analyse real-world scenarios where the wrong tradeoff decisions were made, and discover what could have been done differently. The book lays out the pros and cons of different approaches and explores evergreen patterns that will always be relevant to software design. Code performance versus simplicity. Delivery speed versus duplication. Flexibility versus maintain ability-everydecision you make in software engineering involves balancing tradeoffs. Often, decisions that look good at the design stage can prove problematic in practice.This book reveals the questions you need to be asking to make the right decisions for your own software tradeoffs.

Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback): Daniel Minoli Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback)
Daniel Minoli
R2,190 Discovery Miles 21 900 Ships in 12 - 17 working days

In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT. Although a significant amount of energy is used to operate routing, switching, and transmission equipment, comparatively less attention has been paid to Green Networking. A clear and concise introduction to green networks and green network operations, Designing Green Networks and Network Operations: Saving Run-the-Engine Costs guides you through the techniques available to achieve efficiency goals for corporate and carrier networks, including deploying more efficient hardware, blade form-factor routers and switches, and pursuing consolidation, virtualization, and network and cloud computing. The book: Delineates techniques to minimize network power, cooling, floor space, and online storage while optimizing service performance, capacity, and availability Discusses virtualization, network computing, and Web services as approaches for green data centers and networks Emphasizes best practices and compliance with international standards for green operations Extends the green data center techniques to the networking environment Incorporates green principles in the intranet, extranet, and the entire IT infrastructures Reviews networking, power management, HVAC and CRAC basics Presents methodical steps toward a seamless migration to Green IT and Green Networking

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cloud-based Multi-Modal Information…
Srinidhi Hiriyannaiah, Siddesh G.M., … Hardcover R2,730 Discovery Miles 27 300
Understanding Computers - Today and…
Charles Parker, Deborah Morley Paperback R1,294 R1,162 Discovery Miles 11 620
Asynchronous On-Chip Networks and…
Wei Song, Guangda Zhang Hardcover R2,401 Discovery Miles 24 010
Empowered or Left Behind - Use of…
DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan Hardcover R1,448 Discovery Miles 14 480
Machine Learning and Artificial…
Tawseef Ayoub Shaikh, Saqib Hakak, … Hardcover R4,355 Discovery Miles 43 550
Artificial Intelligence for Capital…
Syed Hasan Jafar, Hemachandran K, … Hardcover R2,997 Discovery Miles 29 970
Research Advances in Intelligent…
Anshul Verma, Pradeepika Verma, … Hardcover R3,034 Discovery Miles 30 340
Multi-Fractal Traffic and Anomaly…
Ming Li Hardcover R2,169 Discovery Miles 21 690
Designing Switch/Routers - Fundamental…
James Aweya Paperback R3,696 Discovery Miles 36 960
The Architecture of Computer Hardware…
I Englander Paperback R4,268 R677 Discovery Miles 6 770

 

Partners