0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (3)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Software Security - Concepts & Practices (Hardcover): Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan Software Security - Concepts & Practices (Hardcover)
Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan
R3,711 Discovery Miles 37 110 Ships in 12 - 17 working days

Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

Computational Intelligent Security in Wireless Communications (Hardcover): Suhel Ahmed Khan, Rajeev Kumar, Omprakash Kaiwartya,... Computational Intelligent Security in Wireless Communications (Hardcover)
Suhel Ahmed Khan, Rajeev Kumar, Omprakash Kaiwartya, Raees Ahmad Khan, Mohammad Faisal
R3,556 Discovery Miles 35 560 Ships in 12 - 17 working days

Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.

Software Durability - Concepts and Practices (Hardcover): Rajeev Kumar, Suhel Ahmad Khan, Raees Ahmad Khan Software Durability - Concepts and Practices (Hardcover)
Rajeev Kumar, Suhel Ahmad Khan, Raees Ahmad Khan
R4,161 Discovery Miles 41 610 Ships in 12 - 17 working days

Software evolution is a time-consuming and costly process due to its complex architecture. Software designers need to produce software that is effective as well as durable. Durability and effectiveness of software are the foremost priorities and challenges for developers. This book comprises real-life case studies of durability issues and their solutions that bring to light loopholes and show how to fix them, to enhance durability. Existing literature on software durability tells us that the first step is to recognise the problem. It gives information about durability, risk, estimation, knowledge, and governance based on five main characteristics: dependability, trustworthiness, usability, security, and human trust. The book serves as a complete package to get acquainted with assurance and risk management from a software durability perspective. It enhances our understanding of the concept of durability, its multi-dimensional approach, threats and their types, risk, mitigation techniques, and suggestive measures. The book reviews the emerging trends in the software development process in the context of durability concepts such as automated code reviews, coding standards, and software durability standards and their testing, cost management solutions, low-code or no-code solutions, and durability assurance.

Limitations and Future Applications of Quantum Cryptography (Hardcover): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Hardcover)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R6,914 Discovery Miles 69 140 Ships in 10 - 15 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Limitations and Future Applications of Quantum Cryptography (Paperback): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Paperback)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R5,301 Discovery Miles 53 010 Ships in 10 - 15 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sony PlayStation Dualshock 4 V2…
R1,303 Discovery Miles 13 030
Croxley Create Wax Crayons - 8mm (24…
R26 Discovery Miles 260
Mountain Backgammon - The Classic Game…
Lily Dyu R575 R460 Discovery Miles 4 600
Bestway Floating Pool Thermometer
R56 Discovery Miles 560
Shield Mr Fix-It Tubeless Repair Kit
R80 Discovery Miles 800
An Introduction To Scholarship…
Cheryl Siewierski Paperback  (2)
R360 Discovery Miles 3 600
Beautiful Trauma
Pink CD  (3)
R133 Discovery Miles 1 330
Xbox One Replacement Case
 (8)
R55 Discovery Miles 550
Comfort Food From Your Slow Cooker - 100…
Sarah Flower Paperback R550 R455 Discovery Miles 4 550
Pet Mall Mattress Style Pet Bed…
R2,339 Discovery Miles 23 390

 

Partners