0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (7)
  • R2,500 - R5,000 (12)
  • -
Status
Brand

Showing 1 - 20 of 20 matches in All Departments

Handbook of Sensor Networking - Advanced Technologies and Applications (Paperback): John R Vacca Handbook of Sensor Networking - Advanced Technologies and Applications (Paperback)
John R Vacca
R1,445 Discovery Miles 14 450 Ships in 9 - 15 working days

The Most Complete and Up-to-Date Account of Advanced Sensor Networking Technologies Handbook of Sensor Networking: Advanced Technologies and Applications provides a complete professional reference and practitioner's guide to today's advanced sensor networking technologies. The handbook focuses on both established and recent sensor networking theory, technology, and practice. Specialists at the forefront of the field address immediate and long-term challenges in their respective areas of expertise and explore practical solutions to a wide range of sensor networking issues. This comprehensive handbook is suitable for a range of readers, including researchers and practitioners, upper-division undergraduate and graduate students, sensor networking technologists and engineers, and security, law enforcement, and governmental agencies. The book gives readers a thorough understanding of the hardware of sensor networks, wireless communication protocols, sensor networks software and architectures, wireless information networks, data manipulation, signal processing, localization, and object tracking through sensor networks.

Online Terrorist Propaganda, Recruitment, and Radicalization (Paperback): John R Vacca Online Terrorist Propaganda, Recruitment, and Radicalization (Paperback)
John R Vacca
R2,136 Discovery Miles 21 360 Ships in 12 - 17 working days

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

Security in the Private Cloud (Paperback): John R Vacca Security in the Private Cloud (Paperback)
John R Vacca
R1,466 Discovery Miles 14 660 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Public Key Infrastructure - Building Trusted Applications and Web Services (Paperback): John R Vacca Public Key Infrastructure - Building Trusted Applications and Web Services (Paperback)
John R Vacca
R1,807 Discovery Miles 18 070 Ships in 12 - 17 working days

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.

Handbook of Sensor Networking - Advanced Technologies and Applications (Hardcover): John R Vacca Handbook of Sensor Networking - Advanced Technologies and Applications (Hardcover)
John R Vacca
R4,624 Discovery Miles 46 240 Ships in 12 - 17 working days

The Most Complete and Up-to-Date Account of Advanced Sensor Networking Technologies Handbook of Sensor Networking: Advanced Technologies and Applications provides a complete professional reference and practitioner's guide to today's advanced sensor networking technologies. The handbook focuses on both established and recent sensor networking theory, technology, and practice. Specialists at the forefront of the field address immediate and long-term challenges in their respective areas of expertise and explore practical solutions to a wide range of sensor networking issues. This comprehensive handbook is suitable for a range of readers, including researchers and practitioners, upper-division undergraduate and graduate students, sensor networking technologists and engineers, and security, law enforcement, and governmental agencies. The book gives readers a thorough understanding of the hardware of sensor networks, wireless communication protocols, sensor networks software and architectures, wireless information networks, data manipulation, signal processing, localization, and object tracking through sensor networks.

Online Terrorist Propaganda, Recruitment, and Radicalization (Hardcover): John R Vacca Online Terrorist Propaganda, Recruitment, and Radicalization (Hardcover)
John R Vacca
R3,593 Discovery Miles 35 930 Ships in 12 - 17 working days

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,735 Discovery Miles 47 350 Ships in 10 - 15 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Cloud Computing Security - Foundations and Challenges (Paperback, 2nd edition): John R Vacca Cloud Computing Security - Foundations and Challenges (Paperback, 2nd edition)
John R Vacca
R2,048 Discovery Miles 20 480 Ships in 12 - 17 working days

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features * Covers patching and configuration vulnerabilities of a cloud server * Evaluates methods for data encryption and long-term storage in a cloud server * Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

Cloud Computing Security - Foundations and Challenges (Hardcover, 2nd edition): John R Vacca Cloud Computing Security - Foundations and Challenges (Hardcover, 2nd edition)
John R Vacca
R4,041 Discovery Miles 40 410 Ships in 12 - 17 working days

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features * Covers patching and configuration vulnerabilities of a cloud server * Evaluates methods for data encryption and long-term storage in a cloud server * Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

Practical Internet Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): John R Vacca Practical Internet Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
John R Vacca
R3,082 Discovery Miles 30 820 Ships in 10 - 15 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Practical Internet Security (Hardcover, 2007 ed.): John R Vacca Practical Internet Security (Hardcover, 2007 ed.)
John R Vacca
R3,123 Discovery Miles 31 230 Ships in 10 - 15 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Nanoscale Networking and Communications Handbook (Hardcover): John R Vacca Nanoscale Networking and Communications Handbook (Hardcover)
John R Vacca
R4,485 Discovery Miles 44 850 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference as well as a practitioner's guide to today's most complete and concise view of nanoscale networking and communications. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies and recent advancements. It explores practical solutions to a wide range of nanoscale networking and communications issues. Individual chapters, authored by leading experts in the field, address the immediate and long-term challenges in the authors' respective areas of expertise. Key Features Identifies the main differences between nanonetworks and classical wireless networks and explains how to leverage those to develop new communication techniques for nanonetworks Presents the different alternatives for network communication among nanomachines, whether these are nanomaterial-based devices or genetically modified cells Provides a framework that will stimulate vision for a family of technologies in nanonetworking communications and multi-scale integration

Smart Cities Policies and Financing - Approaches and Solutions (Paperback): John R Vacca Smart Cities Policies and Financing - Approaches and Solutions (Paperback)
John R Vacca
R3,194 Discovery Miles 31 940 Ships in 12 - 17 working days

Smart Cities Policies and Financing: Approaches and Solutions is the definitive professional reference for harnessing the full potential of policy making and financial planning in smart cities. It covers the effective tools for capturing the dynamic relations between people, policies, financing, and environments, and where they are most often useful and effective for all relevant stakeholders. The book examines the key role of science, technology, and innovation (STI) - especially in information and communications technologies - in the design, development, and management of smart cities policies and financing. It identifies the problems and offers practical solutions in implementation of smart infrastructure policies and financing. Smart Cities Policies and Financing is also about how the implementation of smart infrastructure projects (related to the challenges of the lack of financing and the application of suitable policies) underlines the key roles of science, technology and innovation (STI) communities in addressing these challenges and provides key policies and financing that will help guide the design and development of smart cities.

Guide to Wireless Network Security (Hardcover, 2006 ed.): John R Vacca Guide to Wireless Network Security (Hardcover, 2006 ed.)
John R Vacca
R5,285 R3,446 Discovery Miles 34 460 Save R1,839 (35%) Ships in 12 - 17 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability.
From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Wireless Data Demystified (Paperback, Ed): John R Vacca Wireless Data Demystified (Paperback, Ed)
John R Vacca
R1,631 R1,288 Discovery Miles 12 880 Save R343 (21%) Ships in 10 - 15 working days

UNDERSTAND WIRELESS DATA COMPLETELY, EASILY WITH WIRELESS DATA DEMYSTIFIED


Wireless subscribers are up, but revenue per subscriber isn’t – and it isn’t going to be unless wireless service providers can provide more than plain-vanilla voice services. The road to successful deployment of data services has been difficult, but it is essential if the industry is going to survive. This book takes you inside the data services that will – one way or another – transform the wireless industry.


John R. Vacca wrote the book on wireless data, literally: His Wireless Broadband Networks Handbook is the field’s standard professional reference. Now, in Wireless Data Demystified, he offers a book anyone can understand—without being a certified technical expert. And if you are a technical expert, you will find here the essentials you need, without wading through hundreds of pages of technical detail.


You must read this book if—

* understanding wireless data technologies and their future is your career

* you want a sightline on interlinked wireless data technologies – and a realistic timeline on what’s really happening now

* wireless e-mail, e-commerce, audio, video, stock quotes, information retrieval, and other subscriber services are part of your plan for the future

* networks, technologies, and the protocols that deliver wireless data services are your responsibility

* making the move from straight wireless voice services to data is your company’s survival strategy – or should be

* basic network design and deployment concepts, clearly explained, could put you ahead of the pack

* implementing fixed wireless or WLL (wireless local loop) is a service possibility

* you’re a network manager, administrator, or technician, or work in wireless sales or marketing

* you can see past the troubled present to future investment potential of wireless data


Transmitting wireless data will be a $7.5 billion-a-year business by 2005, industry analysts predict. This book unpacks wireless data essentials to position you to take advantage of this difficult but fast-growing market.

I-mode Crash Course (Paperback): John R Vacca I-mode Crash Course (Paperback)
John R Vacca
R1,154 R937 Discovery Miles 9 370 Save R217 (19%) Ships in 10 - 15 working days

Insider details on the world’s most successful wireless Internet application


The wireless Internet service that dominates the Japanese market is coming to the United States and Europe. i-mode Crash Course helps you prepare, whether your interest is technical or financial…whether you’re offering the killer app or competing against it…even if you’re simply a consumer who wants to get on top of the latest technology. Author John Vacca’s big-picture focus includes installation, deployment and configuration. He provides the insights you need to analyze markets, predict results, and influence outcomes. Learn:


  • How i-mode connects cell phones and other handhelds to the Internet for instant messaging, email, online shopping, real-time news, stocks, weather reports, and more
  • Why i-mode beat out WAP
  • Development secrets behind i-mode applications and the advantages of cHTML
  • The Japanese market strategy and plans to take America and Europe this year

Firewalls - Jumpstart for Network and Systems Administrators (Paperback): John R Vacca, Scott Ellis Firewalls - Jumpstart for Network and Systems Administrators (Paperback)
John R Vacca, Scott Ellis
R2,661 Discovery Miles 26 610 Ships in 10 - 15 working days

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.
-Install and configure proxy-based and stateful-filtering firewalls
-Protect internal IP addresses with NAT and deploy a secure DNS architecture
-Develop an Internet/intranet security policy to protect your organization's systems and data
-Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures

Security in the Private Cloud (Hardcover): John R Vacca Security in the Private Cloud (Hardcover)
John R Vacca
R4,020 Discovery Miles 40 200 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Identity Theft (Hardcover): John R Vacca Identity Theft (Hardcover)
John R Vacca
R1,206 Discovery Miles 12 060 Ships in 12 - 17 working days

Identity theft is the fastest-growing crime in America. Based on credit bureau statistics, an estimated 1.5 million and 1.7 million Americans were victims of identity theft in 2008. From stolen credit card information to hijacked email accounts, from misappropriated personal information to impersonation of others online, the range of identity theft crimes is wide and ever expanding--and most victims never learn how the identity thieves accessed their personal information in the first place.

Because teens post so much personal information online on blogs, social networking sites, and Web sites, they are at high risk for these crimes. Identity Theft explains the different types of identity theft crimes and how they are committed, providing valuable advice on how to protect personal information and stay safe online. Safeguards like Internet safety software and other technologies, such as biometrics, that can help protect an individual's identity are also discussed in this book.

Firewalls Clearly Explained (Paperback): John R Vacca Firewalls Clearly Explained (Paperback)
John R Vacca
R4,232 Discovery Miles 42 320 Out of stock

Computing-intensive organizations have always paid lip service to the issue of system and network security, but their general laxity and technical oversights were exposed by recent, widely publicized hacker attacks. These attacks have prompted renewed vigilance on the part of both businesses and government agencies, and IT professionals are now scrambling to learn everything they can about how to protect their systems against hackers and other security threats.

Firewalls Clearly Explained is destined to be a popular and valuable resource for this enormous audience. Now more than ever, companies large and small need a practical, ground-up introduction to the most common and most effective form of protection: software-based security known as a firewall. This book tells them everything they need to know to get a firewall in place and begin taking security seriously -- again.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Our Long Walk To Economic Freedom…
Johan Fourie Paperback R546 Discovery Miles 5 460
Spaceboy
David Walliams Paperback R297 Discovery Miles 2 970
Scott Weathered - Waverley Genuine…
Ron Grosset Hardcover R298 Discovery Miles 2 980
Advances in Flowmeter Technology…
Jesse Yoder Hardcover R4,148 Discovery Miles 41 480
The Essentials of Marketing Research
Lawrence Silver, Robert E. Stevens, … Paperback R2,506 Discovery Miles 25 060
Philosophies of Polar Law
Dawid Bunikowski, Alan D. Hemmings Hardcover R4,134 Discovery Miles 41 340
Broadband Fixed Wireless Access - A…
Marc Engels, Frederik Petre Paperback R2,939 Discovery Miles 29 390
Transform Your Life with Alchemy - A…
Karen Frazier Paperback R407 R338 Discovery Miles 3 380
Faber-Castell Superpolymer Leads - 0.5…
R247 Discovery Miles 2 470
Women Artists and Writers - Modernist…
B.J. Elliott, Jo-Ann Wallace Paperback R1,229 Discovery Miles 12 290

 

Partners