0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (118)
  • R250 - R500 (227)
  • R500+ (824)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Federal Cloud Computing - The Definitive Guide for Cloud Service Providers (Paperback, 2nd edition): Matthew Metheny Federal Cloud Computing - The Definitive Guide for Cloud Service Providers (Paperback, 2nd edition)
Matthew Metheny
R1,632 Discovery Miles 16 320 Ships in 10 - 15 working days

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.

Data Protection in the Internet (Hardcover, 1st ed. 2020): Dario Moura Vicente, Sofia De Vasconcelos Casimiro Data Protection in the Internet (Hardcover, 1st ed. 2020)
Dario Moura Vicente, Sofia De Vasconcelos Casimiro
R4,617 Discovery Miles 46 170 Ships in 10 - 15 working days

This book identifies and explains the different national approaches to data protection - the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals - and determines the extent to which they could be harmonised in the foreseeable future. In recent years, data protection has become a major concern in many countries, as well as at supranational and international levels. In fact, the emergence of computing technologies that allow lower-cost processing of increasing amounts of information, associated with the advent and exponential use of the Internet and other communication networks and the widespread liberalization of the trans-border flow of information have enabled the large-scale collection and processing of personal data, not only for scientific or commercial uses, but also for political uses. A growing number of governmental and private organizations now possess and use data processing in order to determine, predict and influence individual behavior in all fields of human activity. This inevitably entails new risks, from the perspective of individual privacy, but also other fundamental rights, such as the right not to be discriminated against, fair competition between commercial enterprises and the proper functioning of democratic institutions. These phenomena have not been ignored from a legal point of view: at the national, supranational and international levels, an increasing number of regulatory instruments - including the European Union's General Data Protection Regulation applicable as of 25 May 2018 - have been adopted with the purpose of preventing personal data misuse. Nevertheless, distinct national approaches still prevail in this domain, notably those that separate the comprehensive and detailed protective rules adopted in Europe since the 1995 Directive on the processing of personal data from the more fragmented and liberal attitude of American courts and legislators in this respect. In a globalized world, in which personal data can instantly circulate and be used simultaneously in communications networks that are ubiquitous by nature, these different national and regional approaches are a major source of legal conflict.

Building a Practical Information Security Program (Paperback): Jason Andress, Mark Leary Building a Practical Information Security Program (Paperback)
Jason Andress, Mark Leary
R1,656 R1,458 Discovery Miles 14 580 Save R198 (12%) Ships in 10 - 15 working days

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

Cybersecurity for Coaches and Therapists - A Practical Guide for Protecting Client Data (Hardcover): Alexandra Fouracres Cybersecurity for Coaches and Therapists - A Practical Guide for Protecting Client Data (Hardcover)
Alexandra Fouracres
R4,176 Discovery Miles 41 760 Ships in 10 - 15 working days

-a short handbook designed for practical use by business owners to ensure they act in a professional, ethical and informed way around cybersecurity -first resource of its kind for coaches and therapists

The Security Hippie (Hardcover): Barak Engel The Security Hippie (Hardcover)
Barak Engel
R3,423 Discovery Miles 34 230 Ships in 10 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

ICT and Data Sciences (Hardcover): Archana Singh, Vinod Kumar Shukla, Ashish Seth, Sai Sabitha ICT and Data Sciences (Hardcover)
Archana Singh, Vinod Kumar Shukla, Ashish Seth, Sai Sabitha
R4,928 Discovery Miles 49 280 Ships in 10 - 15 working days

This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems. ICT and Data Sciences brings together IoT and Machine Learning and provides the careful integration of both, along with many examples and case studies. It illustrates the merging of two technologies while presenting basic to high-level concepts covering different fields and domains such as the Hospitality and Tourism industry, Smart Clothing, Cyber Crime, Programming, Communications, Business Intelligence, all in the context of the Internet of Things. The book is written for researchers and practitioners, working in Information Communication Technology and Computer Science.

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R802 Discovery Miles 8 020 Ships in 10 - 15 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

Botnets - Architectures, Countermeasures, and Challenges (Paperback): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Paperback)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Strategic Cyber Deterrence - The Active Cyber Defense Option (Hardcover): Scott Jasper Strategic Cyber Deterrence - The Active Cyber Defense Option (Hardcover)
Scott Jasper
R2,672 Discovery Miles 26 720 Ships in 10 - 15 working days

According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors' advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors' objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.

Cyber Guerilla (Paperback): Jelle Van Haaster, Rickey Gevers, Martijn Sprengers Cyber Guerilla (Paperback)
Jelle Van Haaster, Rickey Gevers, Martijn Sprengers
R1,182 R1,022 Discovery Miles 10 220 Save R160 (14%) Ships in 10 - 15 working days

Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors' own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

Implementing Digital Forensic Readiness - From Reactive to Proactive Process (Paperback): Jason Sachowski Implementing Digital Forensic Readiness - From Reactive to Proactive Process (Paperback)
Jason Sachowski
R1,370 Discovery Miles 13 700 Ships in 10 - 15 working days

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization's business operations and information security's program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.

Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Hardcover): Sonali Vyas, Vinod Kumar Shukla,... Blockchain Technology - Exploring Opportunities, Challenges, and Applications (Hardcover)
Sonali Vyas, Vinod Kumar Shukla, Shaurya Gupta, Ajay Prasad
R5,541 Discovery Miles 55 410 Ships in 10 - 15 working days

This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.

Cybersecurity for Beginners - What You Must Know about Cybersecurity (Hardcover): Attila Kovacs Cybersecurity for Beginners - What You Must Know about Cybersecurity (Hardcover)
Attila Kovacs
R718 R635 Discovery Miles 6 350 Save R83 (12%) Ships in 10 - 15 working days
Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Hiding Behind the Keyboard - Uncovering Covert Communication Methods with Forensic Analysis (Paperback): Brett Shavers, John... Hiding Behind the Keyboard - Uncovering Covert Communication Methods with Forensic Analysis (Paperback)
Brett Shavers, John Bair
R1,273 Discovery Miles 12 730 Ships in 10 - 15 working days

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate covert communication, while giving investigators the information they need for detecting cybercriminals who attempt to hide their true identity. Intended for practitioners and investigators, the book offers concrete examples on how to communicate securely, serving as an ideal reference for those who truly need protection, as well as those who investigate cybercriminals.

Cyberspace, Data Analytics, and Policing (Hardcover): David Skillicorn Cyberspace, Data Analytics, and Policing (Hardcover)
David Skillicorn
R2,146 Discovery Miles 21 460 Ships in 10 - 15 working days

Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.

Digital Forensics - Threatscape and Best Practices (Paperback): John Sammons Digital Forensics - Threatscape and Best Practices (Paperback)
John Sammons
R1,078 Discovery Miles 10 780 Ships in 10 - 15 working days

Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.

Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Paperback): Ulf Mattsson Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Paperback)
Ulf Mattsson
R1,330 Discovery Miles 13 300 Ships in 10 - 15 working days

Unique selling point: * Gain practical tools to solve complex data privacy and security subjects for different business use cases and types of data. Core audience: * Suited to anyone in a CISOs, CSOs, CPOs, CDOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. Place in the market: * Tackles the critical skills needed to succeed in the evolving landscape of regulations and data breaches.

Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Hardcover): Ulf Mattsson Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Hardcover)
Ulf Mattsson
R1,913 Discovery Miles 19 130 Ships in 10 - 15 working days

Unique selling point: * Gain practical tools to solve complex data privacy and security subjects for different business use cases and types of data. Core audience: * Suited to anyone in a CISOs, CSOs, CPOs, CDOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. Place in the market: * Tackles the critical skills needed to succeed in the evolving landscape of regulations and data breaches.

Practical Deployment of Cisco Identity Services Engine (ISE) - Real-World Examples of AAA Deployments (Paperback): Andy... Practical Deployment of Cisco Identity Services Engine (ISE) - Real-World Examples of AAA Deployments (Paperback)
Andy Richter, Jeremy Wood
R1,563 Discovery Miles 15 630 Ships in 10 - 15 working days

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

Systemic Bias - Algorithms and Society (Hardcover): Michael Filimowicz Systemic Bias - Algorithms and Society (Hardcover)
Michael Filimowicz
R1,730 Discovery Miles 17 300 Ships in 10 - 15 working days

Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics. The output of computational models is directly tied not only to their inputs but to the relationships and assumptions embedded in their model design, many of which are of a social and cultural, rather than physical and mathematical, nature. How do human biases make their way into these data models, and what new strategies have been proposed to overcome bias in computed products? Scholars and students from many backgrounds, as well as policy makers, journalists, and the general reading public will find a multidisciplinary approach to inquiry into algorithmic bias encompassing research from Communication, Art, and New Media.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Legal Data and Information in Practice - How Data and the Law Interact (Hardcover): Sarah A. Sutherland Legal Data and Information in Practice - How Data and the Law Interact (Hardcover)
Sarah A. Sutherland
R4,483 Discovery Miles 44 830 Ships in 10 - 15 working days

Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups. Presenting a synthesis of information about legal data that will furnish readers with a thorough understanding of the topic, the book also explains why it is becoming crucial that data analysis be integrated into decision-making in the legal space. Legal organizations are looking at how to develop data-driven insights for a variety of purposes and it is, as Sutherland shows, vital that they have the necessary skills to facilitate this work. This book will assist in this endeavour by providing an international perspective on the issues affecting access to legal data and clearly describing methods of obtaining and evaluating it. Sutherland also incorporates advice about how to critically approach data analysis. Legal Data and Information in Practice will be essential reading for those in the law library community who are based in English-speaking countries with a common law tradition. The book will also be useful to those with a general interest in legal data, including students, academics engaged in the study of information science and law.

Business Analytics and Cyber Security Management in Organizations (Hardcover): Rajagopal, Ramesh Behl Business Analytics and Cyber Security Management in Organizations (Hardcover)
Rajagopal, Ramesh Behl
R5,885 Discovery Miles 58 850 Ships in 10 - 15 working days

Traditional marketing techniques have become outdated by the emergence of the internet, and for companies to survive in the new technological marketplace, they must adopt digital marketing and business analytics practices. Unfortunately, with the benefits of improved storage and flow of information comes the risk of cyber-attack. Business Analytics and Cyber Security Management in Organizations compiles innovative research from international professionals discussing the opportunities and challenges of the new era of online business. Outlining updated discourse for business analytics techniques, strategies for data storage, and encryption in emerging markets, this book is ideal for business professionals, practicing managers, and students of business.

Convergence of Blockchain, AI, and IoT - Concepts and Challenges (Hardcover): R. Indrakumari, Vijanth Sagayan Asirvadam, R.... Convergence of Blockchain, AI, and IoT - Concepts and Challenges (Hardcover)
R. Indrakumari, Vijanth Sagayan Asirvadam, R. Lakshmana Kumar, B. Balusamy
R4,917 Discovery Miles 49 170 Ships in 10 - 15 working days

Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel algorithms, solutions for addressing issues in applications, security, authentication, and privacy. The book provides an overview of the clinical scientific research enabling smart diagnosis equipment through AI. It presents the role these technologies play in augmented reality and blockchain, covers digital currency managed with bitcoin, and discusses deep learning and how it can enhance human thoughts and behaviors. Targeted audiences range from those interested in the technical revolution of blockchain, big data and the Internet of Things, to research scholars and the professional market.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cyber Warfare and Terrorism - Concepts…
Information Reso Management Association Hardcover R11,205 Discovery Miles 112 050
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R10,216 Discovery Miles 102 160
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,354 Discovery Miles 23 540
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,731 Discovery Miles 67 310
Permanent Record
Edward Snowden Paperback R299 R271 Discovery Miles 2 710
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,742 Discovery Miles 77 420
Online Predators, an Internet Insurgency…
Jeffrey A. Lee Paperback R606 Discovery Miles 6 060
Security and Privacy Management…
Yassine Maleh Hardcover R5,556 Discovery Miles 55 560
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R805 Discovery Miles 8 050
Hacking - Beginners Guide, Wireless…
Alex Wagner Hardcover R1,606 R1,331 Discovery Miles 13 310

 

Partners