0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (407)
  • R250 - R500 (1,174)
  • R500+ (11,405)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Cyber Security: Essential Principles to Secure Your Organisation (Paperback): IT Governance Cyber Security: Essential Principles to Secure Your Organisation (Paperback)
IT Governance
R363 Discovery Miles 3 630 Ships in 12 - 17 working days

Cyber Security - Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Organisations large and small experience attacks every day, from simple phishing emails to intricate, detailed operations masterminded by criminal gangs, and for every vulnerability fixed, another pops up, ripe for exploitation. Cyber security doesn't have to cost vast amounts of money or take a short ice age to implement. No matter the size of your organisation, improving cyber security helps protect your data and that of your clients, improving business relations and opening the door to new opportunities. This pocket guide will take you through the essentials of cyber security - the principles that underpin it, vulnerabilities and threats and the attackers who use them, and how to defend against them - so you can confidently develop a cyber security programme. Cyber Security - Essential principles to secure your organisation Covers the key differences between cyber and information security; Explains how cyber security is increasingly mandatory and how this ties into data protection, e.g. the Data Protection Act 2018 and the GDPR (General Data Protection Regulation); Focuses on the nature of the problem, looking at technical, physical and human threats and vulnerabilities; Explores the importance of security by design; Gives guidance on why security should be balanced and centralised; and Introduces the concept of using standards and frameworks to manage cyber security. No matter the size of your organisation, cyber security is no longer optional - it is an essential component of business success and a critical defence against the risks of the information age. The only questions left are to decide when and where your journey will begin. Start that journey now - buy this book today!

The Skeleton Crew - How Amateur Sleuths Are Solving America's Coldest Cases (Paperback): Deborah Halber The Skeleton Crew - How Amateur Sleuths Are Solving America's Coldest Cases (Paperback)
Deborah Halber
R461 R380 Discovery Miles 3 800 Save R81 (18%) Ships in 10 - 15 working days
Understanding Users - Designing Experience through Layers of Meaning (Hardcover): Andrew Dillon Understanding Users - Designing Experience through Layers of Meaning (Hardcover)
Andrew Dillon
R3,757 Discovery Miles 37 570 Ships in 12 - 17 working days

Grounded in the user-centered design movement, this book offers a broad consideration of how our civilization has evolved its technical infrastructure for human purpose to help us make sense of the contemporary world of information infrastructure and online existence. The author incorporates historical, cultural and aesthetic approaches to situating information and its underlying technologies across time in the collective, lived experiences of humanity. In today's digital information world, user experience is vital to the success of any product or service. Yet as the user population expands to include us all, designing for people who vary in skills, abilities, preferences and backgrounds is challenging. This book provides an integrated understanding of users, and the methods that have evolved to identify usability challenges, that can facilitate cohesive and earlier solutions. The book treats information creation and use as a core human behavior based on acts of representation and recording that humans have always practiced. It suggests that the traditional ways of studying information use, with their origins in the distinct layers of social science theories and models is limiting our understanding of what it means to be an information user and hampers our efforts at being truly user-centric in design. Instead, the book offers a way of integrating the knowledge base to support a richer view of use and users in design education and evaluation. Understanding Users is aimed at those studying or practicing user-centered design and anyone interested in learning how people might be better integrated in the design of new technologies to augment human capabilities and experiences.

AI for Diversity (Hardcover): Roger Soraa AI for Diversity (Hardcover)
Roger Soraa
R3,596 Discovery Miles 35 960 Ships in 12 - 17 working days

It explore issues of diversity and inclusion in relation to artificial intelligence (AI). The author leads a research group on Digitalization and Robotization of Society at NTNU Norwegian University of Science and Technology.

A Selection of Image Understanding Techniques - From Fundamentals to Research Front (Hardcover): Yu-jin Zhang A Selection of Image Understanding Techniques - From Fundamentals to Research Front (Hardcover)
Yu-jin Zhang
R3,641 Discovery Miles 36 410 Ships in 12 - 17 working days

This book offers a comprehensive introduction to seven commonly used image understanding techniques in modern information technology. Readers of various levels can find suitable techniques to solve their practical problems and discover the latest development in these specific domains. The techniques covered include camera model and calibration, stereo vision, generalized matching, scene analysis and semantic interpretation, multi-sensor image information fusion, content-based visual information retrieval, and understanding spatial-temporal behavior. The book provides aspects from the essential concepts overview and basic principles to detailed introduction, explanation of the current methods and their practical techniques. It also presents discussions on the research trends and latest results in conjunction with new development of technical methods. This is an excellent read for those who do not have a subject background in image technology but need to use these techniques to complete specific tasks. These essential information will also be useful for their further study in the relevant fields.

Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback): IT Governance Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback)
IT Governance
R364 Discovery Miles 3 640 Ships in 12 - 17 working days

ISO/IEC 27701:2019: An introduction to privacy information management offers a concise introduction to the Standard, aiding those organisations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.

Philosophy through Computer Science - An Introduction (Hardcover): Daniel Lim Philosophy through Computer Science - An Introduction (Hardcover)
Daniel Lim
R3,757 Discovery Miles 37 570 Ships in 12 - 17 working days

What do philosophy and computer science have in common? It turns out, quite a lot! In providing an introduction to computer science (using Python), Daniel Lim presents in this book key philosophical issues, ranging from external world skepticism to the existence of God to the problem of induction. These issues, and others, are introduced through the use of critical computational concepts, ranging from image manipulation to recursive programming to elementary machine learning techniques. In illuminating some of the overlapping conceptual spaces of computer science and philosophy, Lim teaches the reader fundamental programming skills and also allows her to develop the critical thinking skills essential for examining some of the enduring questions of philosophy. Key Features Teaches readers actual computer programming, not merely ideas about computers Includes fun programming projects (like digital image manipulation and Game of Life simulation), allowing the reader to develop the ability to write larger computer programs that require decomposition, abstraction, and algorithmic thinking Uses computational concepts to introduce, clarify, and develop a variety of philosophical issues Covers various aspects of machine learning and relates them to philosophical issues involving science and induction as well as to ethical issues Provides a framework to critically analyze arguments in classic and contemporary philosophical debates

How To Do Nothing - Resisting the Attention Economy (Paperback): Jenny Odell How To Do Nothing - Resisting the Attention Economy (Paperback)
Jenny Odell
R460 R376 Discovery Miles 3 760 Save R84 (18%) Ships in 9 - 15 working days
National Security in the New World Order - Government and the Technology of Information (Paperback): Andrea Monti, Raymond Wacks National Security in the New World Order - Government and the Technology of Information (Paperback)
Andrea Monti, Raymond Wacks
R1,147 Discovery Miles 11 470 Ships in 9 - 15 working days

This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital technology and its business models have shaped public policy and charts its future course. In this vital text for legislators and policymakers, Andrea Monti and Raymond Wacks draw on several case studies to analyse the changing nature of national security and revisit the traditional idea of the sovereignty of the State. They highlight some of the limitations of the conventional understanding of public policy, national security, and the rule of law to reveal the role of digital technology as an enabler as well as discriminator in governance and social disorder. Further, the chapters in the book explore the tenuous balance between individual freedom and national security; the key role of data protection in safeguarding digital data; Big Tech's appropriation of national security policy; the debate relating to datagathering technologies and encryption; and offers an unsettling answer to the question 'what is a leak?' A stimulating read, this key text will be of immense interest to scholars of politics, cyberculture, and national security, as well as to policy analysts, lawyers, and journalists.

Through the Interface - A Human Activity Approach To User Interface Design (Hardcover): Susanne Bodker Through the Interface - A Human Activity Approach To User Interface Design (Hardcover)
Susanne Bodker
R1,762 Discovery Miles 17 620 Ships in 12 - 17 working days

In providing a theoretical framework for understanding human- computer interaction as well as design of user interfaces, this book combines elements of anthropology, psychology, cognitive science, software engineering, and computer science. The framework examines the everyday work practices of users when analyzing and designing computer applications. The text advocates the unique theory that computer application design is fundamentally a collective activity in which the various practices of the participants meet in a process of mutual learning.

The Construction of Truth in Contemporary Media Narratives about Risk (Paperback): John Gaffey The Construction of Truth in Contemporary Media Narratives about Risk (Paperback)
John Gaffey
R1,170 Discovery Miles 11 700 Ships in 12 - 17 working days

The Construction of Truth in Contemporary Media Narratives about Risk provides a theoretical framework for how, in a post-truth era, media audiences are able to understand and navigate everyday risk. The book examines media risk narratives and explores forms of truth, experiential knowledge, and authority. Using the concept of parrhesia to show how we invest trust in various types of knowledge in a changing media environment, the book demonstrates how we choose between expert and non-expert information when navigating a seemingly risky world. It considers how news media formats have previously engaged audiences through risk narratives and examines how experiential knowledge has come to hold a valuable place for individuals navigating what we are often told is an increasingly risky and uncertain world. The book also examines the increasingly precarious position of expert knowledge and examines how contemporary truth-games play out between experts and non-experts, and considers how this extends into the world of online and social media. This book will be of interest to those researching or teaching in the areas of criminology, sociology, media and cultural studies, and of interest to readers in professional areas such as journalism and politics.

How Cyber Security Can Protect Your Business - A Guide for All Stakeholders (Paperback): IT Governance How Cyber Security Can Protect Your Business - A Guide for All Stakeholders (Paperback)
IT Governance
R363 Discovery Miles 3 630 Ships in 12 - 17 working days

Summary Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape. Gives strategic, business-focused guidance and advice relevant to C-suite executives. Provides an effective and efficient framework for managing cyber governance, risk and compliance. Explains what is required to implement an effective cyber security strategy. Description With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously. Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue. Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation. How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy. The pocket guide: Gives readers a greater understanding of cyber governance, risk and compliance; Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape; Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response; Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way; Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and Includes a checklist to help readers focus on their higher-priority cyber areas. Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language. Kick-start your journey to becoming cyber secure - buy this pocket guide today!

Algorithms, Humans, and Interactions - How Do Algorithms Interact with People? Designing Meaningful AI Experiences (Hardcover):... Algorithms, Humans, and Interactions - How Do Algorithms Interact with People? Designing Meaningful AI Experiences (Hardcover)
Don Donghee Shin
R3,329 Discovery Miles 33 290 Ships in 12 - 17 working days

Takes an interdisciplinary approach to contribute to the ongoing development of human-AI interaction. Current debate and development of AI is "algorithm-driven" or technical-oriented in lieu of human-centered. At present, there is no systematic interdisciplinary discussion to effectively deal with issues and challenges arising from AI. This book offers critical analysis of the logic and social implications of algorithmic processes. Reporting from the processes of scientific research, the results can be useful for understanding the relationship between algorithms and humans, allowing AI designers to assess the quality of the meaningful interactions with AI systems.

The Usage and Impact of ICTs during the Covid-19 Pandemic (Hardcover): Shengnan Yang, Xiaohua Zhu, Pnina Fichman The Usage and Impact of ICTs during the Covid-19 Pandemic (Hardcover)
Shengnan Yang, Xiaohua Zhu, Pnina Fichman
R3,763 Discovery Miles 37 630 Ships in 12 - 17 working days

This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology. Specific attention is given to various stakeholders and social contexts, with analysis at the individual, group, community, and society levels. Pushing the boundaries of information science research with timely and critical research questions, this edited volume showcases information science research in the context of COVID-19, by specifically accentuating sociotechnical practices, activities, and ICT interventions during the pandemic. Its social informatics focus appeals to a broad audience, and its global and international orientation provides a timely, innovative, and much-needed perspective to information science. This book is unique in its interdisciplinary nature as it consists of research studies on the intersections between ICTs and health, culture, social interaction, civic engagement, information dissemination, work, and education. Chapters apply a range of research methods, including questionnaire surveys, content analyses, and case studies from countries in Asia, Europe, and America, as well as global and international comparisons. The book's primary target audience includes scholars and students in information and library science, particularly those interested in the social aspect of the information society. It may be of interest to information professionals, library practitioners, educators, and information policymakers, as well as scholars and students in science and technology studies, cultural studies, political science, public administration, sociology, and communication studies.

Drawing Product Ideas - Fast and Easy UX Drawing  for Anyone (Paperback): KE Eisenhuth Drawing Product Ideas - Fast and Easy UX Drawing for Anyone (Paperback)
KE Eisenhuth
R541 Discovery Miles 5 410 Ships in 12 - 17 working days

Explore straightforward drawing skills to help you communicate product ideas exponentially faster than you could with text In Drawing Product Ideas: Fast and Easy UX Drawing for Anyone, RSA Fellow and Google Data Visualization Lead, Kent Eisenhuth delivers a new and exciting guide to effectively communicating product ideas by drawing just two simple things: boxes and lines! In the book, you'll learn why drawing is important and how it supports the design thinking process. You'll also discover how to build your drawing toolkit by exploring your own personal drawing style. The author also includes: Strategies for how to use your drawing to support your solutions to real-world problems Tips and tricks for applying your new drawing skills in a workshop setting, in real-time An illuminating foreword by the celebrated Manuel Lima, a Fellow of the Royal Society of Arts An essential volume for engineers, researchers, and product managers, Drawing Product Ideas is also an indispensable blueprint for anyone seeking to improve their public, ad-hoc drawing skills.

Statistics and Data Visualisation with Python (Hardcover): Jesus Rogel-Salazar Statistics and Data Visualisation with Python (Hardcover)
Jesus Rogel-Salazar
R3,671 Discovery Miles 36 710 Ships in 12 - 17 working days

* Targests readers with a background in programming, interested in an introduction/refresher in statistical hypothesis testing * Uses Python throughout * Provides the reader with the opportunity of using the book whenever needed rather than following a sequential path.

Atari 2600/7800: a visual compendium (Hardcover): Bitmap Books Atari 2600/7800: a visual compendium (Hardcover)
Bitmap Books 1
R1,120 Discovery Miles 11 200 Ships in 9 - 15 working days
Digital Approaches to Inclusion and Participation in Cultural Heritage - Insights from Research and Practice in Europe... Digital Approaches to Inclusion and Participation in Cultural Heritage - Insights from Research and Practice in Europe (Hardcover)
Danilo Giglitto, Luigina Ciolfi, Eleanor Lockley, Eirini Kaldeli
R3,757 Discovery Miles 37 570 Ships in 12 - 17 working days

Digital Approaches to Inclusion and Participation in Cultural Heritage brings together best examples and practices of digital and interactive approaches and platforms from a number of projects based in European countries to foster social inclusion and participation in heritage and culture. It engages with ongoing debates on the role of culture and heritage in contemporary society relating to inclusion and exclusion, openness, access, and bottom-up participation. The contributions address key themes such as the engagement of marginalised communities, the opening of debates and new interpretations around socially and historically contested heritages, and the way in which digital technologies may foster more inclusive cultural heritage practices. They will also showcase examples of work that can inspire reflection, further research, and also practice for readers such as practice-focused researchers in both HCI and design. Indeed, as well as consolidating the achievements of researchers, the contributions also represent concrete approaches to digital heritage innovation for social inclusion purposes. The book's primary audience is academics, researchers, and students in the fields of cultural heritage, digital heritage, human-computer interaction, digital humanities, and digital media, as well as practitioners in the cultural sector.

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Paperback): Shuang Geng, Kris M y Law,... Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Paperback)
Shuang Geng, Kris M y Law, Andrew W. H. Ip, Brij B. Gupta
R1,136 Discovery Miles 11 360 Ships in 9 - 15 working days

Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing not only targets IT experts and drills down on the technical issues but also provides readers from various groups with a well-linked concept about how the latest trends of mobile technologies are closely related to daily living and the workplace at managerial and even individual levels.

Information - A Historical Companion (Hardcover): Ann Blair, Paul Duguid, Anja-Silvia Goeing, Anthony Grafton Information - A Historical Companion (Hardcover)
Ann Blair, Paul Duguid, Anja-Silvia Goeing, Anthony Grafton
R1,418 Discovery Miles 14 180 Ships in 12 - 17 working days

A landmark history that traces the creation, management, and sharing of information through six centuries Thanks to modern technological advances, we now enjoy seemingly unlimited access to information. Yet how did information become so central to our everyday lives, and how did its processing and storage make our data-driven era possible? This volume is the first to consider these questions in comprehensive detail, tracing the global emergence of information practices, technologies, and more, from the premodern era to the present. With entries spanning archivists to algorithms and scribes to surveilling, this is the ultimate reference on how information has shaped and been shaped by societies. Written by an international team of experts, the book's inspired and original long- and short-form contributions reconstruct the rise of human approaches to creating, managing, and sharing facts and knowledge. Thirteen full-length chapters discuss the role of information in pivotal epochs and regions, with chief emphasis on Europe and North America, but also substantive treatment of other parts of the world as well as current global interconnections. More than 100 alphabetical entries follow, focusing on specific tools, methods, and concepts-from ancient coins to the office memo, and censorship to plagiarism. The result is a wide-ranging, deeply immersive collection that will appeal to anyone drawn to the story behind our modern mania for an informed existence. Tells the story of information's rise from 1450 through to today Covers a range of eras and regions, including the medieval Islamic world, late imperial East Asia, early modern and modern Europe, and modern North America Includes 100 concise articles on wide-ranging topics: Concepts: data, intellectual property, privacy Formats and genres: books, databases, maps, newspapers, scrolls and rolls, social media People: archivists, diplomats and spies, readers, secretaries, teachers Practices: censorship, forecasting, learning, political reporting, translating Processes: digitization, quantification, storage and search Systems: bureaucracy, platforms, telecommunications Technologies: cameras, computers, lithography Provides an informative glossary, suggested further reading (a short bibliography accompanies each entry), and a detailed index Written by an international team of notable contributors, including Jeremy Adelman, Lorraine Daston, Devin Fitzgerald, John-Paul Ghobrial, Lisa Gitelman, Earle Havens, Randolph C. Head, Niv Horesh, Sarah Igo, Richard R. John, Lauren Kassell, Pamela Long, Erin McGuirl, David McKitterick, Elias Muhanna, Thomas S. Mullaney, Carla Nappi, Craig Robertson, Daniel Rosenberg, Neil Safier, Haun Saussy, Will Slauter, Jacob Soll, Heidi Tworek, Siva Vaidhyanathan, Alexandra Walsham, and many more.

Game Usability - Advice from the Experts for Advancing UX Strategy and Practice in Videogames (Paperback, 2nd edition):... Game Usability - Advice from the Experts for Advancing UX Strategy and Practice in Videogames (Paperback, 2nd edition)
Katherine Isbister, Celia Hodent
R1,427 Discovery Miles 14 270 Ships in 9 - 15 working days

This book introduces the basics in game usability and overall game UX mindset and techniques, as well as looking at current industry best practices and trends. Fully updated for its second edition, it includes practical advice on how to include usability in already tight development timelines, and how to advocate for UX and communicate results to higher-ups effectively. The book begins with an introduction to UX strategy considerations for games, and to UX design, before moving on to cover core user research and usability techniques as well as how to fit UX practices into the business process. It provides considerations of player differences and offers strategies for inclusion as well as chapters that give platform and context specific advice. With a wealth of new interviews with industry leaders and contributions from the very best in game UX, the book also includes brand new chapters on: Accessibility Mobile Game Usability Data Science Virtual and Augmented Reality Esports This book will be vital reading for all professional game developers and game UX advocates, as well as those students aspiring to work in game development and game UX.

The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback): Preston Bukaty The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback)
Preston Bukaty
R875 Discovery Miles 8 750 Ships in 12 - 17 working days

Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation. Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to: Learn what personal data a business has collected about them Understand who this data has been disclosed to Find out whether their personal data has been sold to third parties, and who these third parties are Opt-out of such data transactions, or request that the data be deleted. Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties. Prepare your business for CCPA compliance with our implementation guide that: Provides the reader with a comprehensive understanding of the legislation by explaining key terms Explains how a business can implement strategies to comply with the CCPA Discusses potential developments of the CCPA to further aid compliance Your guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need! About the author Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston's legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the GDPR and the CCPA. He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,239 Discovery Miles 12 390 Ships in 12 - 17 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

AI and Society - Tensions and Opportunities (Hardcover): Christo El Morr AI and Society - Tensions and Opportunities (Hardcover)
Christo El Morr
R2,758 Discovery Miles 27 580 Ships in 12 - 17 working days

AI's impact on human societies is and will be drastic in so many ways. AI is being adopted and implemented around the world, and government and universities are investing in AI studies, research, and development. However, very little research exists about the impact of AI on our lives. This book will address this gap; it will gather reflections from around the world to assess the impact of AI on different aspects of society as well as propose ways in which we can address this impact and the research agendas needed.

Innovation in Crisis Management (Hardcover): Chiara Fonio, Adam Widera, Tomasz Zweglinski Innovation in Crisis Management (Hardcover)
Chiara Fonio, Adam Widera, Tomasz Zweglinski
R3,789 Discovery Miles 37 890 Ships in 12 - 17 working days

This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R440 Discovery Miles 4 400
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R591 R515 Discovery Miles 5 150
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,159 Discovery Miles 11 590
The Handover - How We Gave Control Of…
David Runciman Hardcover R630 R504 Discovery Miles 5 040

 

Partners