0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

New Age Analytics - Transforming the Internet through Machine Learning, IoT, and Trust Modeling (Paperback): Gulshan... New Age Analytics - Transforming the Internet through Machine Learning, IoT, and Trust Modeling (Paperback)
Gulshan Shrivastava, Sheng-Lung Peng, Himani Bansal, Kavita Sharma, Meenakshi Sharma
R2,482 R2,085 Discovery Miles 20 850 Save R397 (16%) Ships in 9 - 15 working days

This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more. This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.

Digital Marketing Outreach - The Future of Marketing Practices (Hardcover): Kavita Sharma, Swati Aggarwal Digital Marketing Outreach - The Future of Marketing Practices (Hardcover)
Kavita Sharma, Swati Aggarwal
R4,146 Discovery Miles 41 460 Ships in 12 - 17 working days

This book studies the use of digital marketing across the economic, social, and political sectors of India. It looks at diverse areas of business and non-business activities involving the use of digital platforms to augment marketing initiatives and improve reach, sales, and social media engagement. The volume analyses various themes including viral marketing, influencer marketing, webrooming behaviour, online impulse buying, telemedicine, social media advertising, and app-based cab services. It examines the role of digital marketing in creating a positive and favourable brand image for organizations by advertising their social responsiveness on social media and studies the influence of political brand value on social media activities. The authors also provide insight into changing trends within consumer behaviour, reflect on future challenges within the field, and highlight areas of growth. An important contribution to the study of new and emerging marketing practices, the book will be indispensable for students, researchers, and teachers of communication, marketing, brand management, social media marketing, advertising, e-business, digital humanities, and consumer behaviour.

New Age Analytics - Transforming the Internet through Machine Learning, IoT, and Trust Modeling (Hardcover): Gulshan... New Age Analytics - Transforming the Internet through Machine Learning, IoT, and Trust Modeling (Hardcover)
Gulshan Shrivastava, Sheng-Lung Peng, Himani Bansal, Kavita Sharma, Meenakshi Sharma
R4,045 Discovery Miles 40 450 Ships in 12 - 17 working days

This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more. This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.

Comprehensive Guide to Heterogeneous Networks (Paperback): Kiran Ahuja, Anand Nayyar, Kavita Sharma Comprehensive Guide to Heterogeneous Networks (Paperback)
Kiran Ahuja, Anand Nayyar, Kavita Sharma
R2,603 Discovery Miles 26 030 Ships in 12 - 17 working days

Comprehensive Guide to Heterogeneous Networks discusses the fundamental motivations behind this cutting-edge development, along with a brief discussion on the diverse definitions of HNs. The future of heterogeneous wireless networks (HWNs) is covered, including test cases, cost configuration, economic benefits and basic challenges. Other sections cover the topology management method in context of heterogeneous sensor nodes with diverse communication and sensing range. In addition, an outline of the pros and cons of the clustering criteria in HWSNs and taxonomy are summarized and provide futuristic research directions. Final sections discuss the future evolution of HNs and their implementations in diverse applications. This is an essential reference book for advanced students on courses in wireless communications, clinical engineering and networking. It will also be of interest to researchers, network planners, technical mangers and other professionals in these fields.

Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover): Gulshan Shrivastava, Deepak... Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover)
Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
R4,851 Discovery Miles 48 510 Ships in 10 - 15 working days

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.

Pass Pmp in 21 Days III - Itto + Keywords (Paperback): Kavita Sharma Pass Pmp in 21 Days III - Itto + Keywords (Paperback)
Kavita Sharma
R333 R279 Discovery Miles 2 790 Save R54 (16%) Ships in 10 - 15 working days
Pass PMP in 21 Days - II Practice Tests (Paperback): Kavita Sharma Pass PMP in 21 Days - II Practice Tests (Paperback)
Kavita Sharma
R679 R566 Discovery Miles 5 660 Save R113 (17%) Ships in 10 - 15 working days
Windmills of the Mind (Paperback): Kavita Sharma Windmills of the Mind (Paperback)
Kavita Sharma
R179 Discovery Miles 1 790 Ships in 10 - 15 working days
Pass PMP in 21 Days I - Study Guide (Paperback): Kavita Sharma Pass PMP in 21 Days I - Study Guide (Paperback)
Kavita Sharma
R1,005 R834 Discovery Miles 8 340 Save R171 (17%) Ships in 10 - 15 working days
Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R5,970 Discovery Miles 59 700 Ships in 10 - 15 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Forensic Investigations and Risk Management in Mobile and Wireless Communications (Paperback): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Paperback)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R4,636 Discovery Miles 46 360 Ships in 10 - 15 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private ""e-Discovery"" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Common & Uncommon Proverbs (Paperback): Kavita Sharma Common & Uncommon Proverbs (Paperback)
Kavita Sharma
R245 Discovery Miles 2 450 Ships in 12 - 17 working days

The present book comes with a collection and uncommon proverbs that are bound to capture the reader's attention. Indeed, once the readers understand their meanings and the manner of using them, they won't be able to stop themselves from using them in their conversation and in writing.

Leaf-Surface Mycoflora of Ocimum Sanctum (Paperback): Kavita Sharma Leaf-Surface Mycoflora of Ocimum Sanctum (Paperback)
Kavita Sharma
R1,292 Discovery Miles 12 920 Ships in 10 - 15 working days

Leaf surface is the plateform of the numerous fungal spores present in the air. During suitable microhabitat these spores are settled down on this having plateform and try to colonised. After settal down fungal spores, a triangular relationship appears among the micro-organisms, leaf surface and the environment. The seeds, leaves and the roots of Ocimum sanctum have great medicinal value. It is used both, internally as well as externally. Ocimum sanctum has mild antiseptic, analgesic properties and it relieves the swellings also. Hence, it beneficial, externally, in various skin diseases. The paste of leaves works well, with marica powder, when applied topically in ringworm infestations. The dressing with the pulp of its leaves effectively controls the infections and hastens the healing of chronic infected wounds. The leaves when chewed mitigate the infections of the gums. Instillation of fresh juice of the leaves into ears is an effective domestic medicament for ear aches. The present study deals with study of leaf surface mycoflora of Ocimum sanctum L. plant.

Biodeterioration of Ancient Monuments (Paperback): Kavita Sharma Biodeterioration of Ancient Monuments (Paperback)
Kavita Sharma
R1,282 Discovery Miles 12 820 Ships in 10 - 15 working days

Microbial activity can have an important impact on the durability of building materials. The harmful effects by the colonisting of micro-organism on the monuments is scientifically known as biodeterioration. Biodeterioration of ancient buildings and monuments depend upon many factors. Preservation of these monuments is very necessary. Although many studies on microorganism and deterioration have been published in recent years, books and congress proceedings focus mainly on prokaryotes and algae. Therefore, it is the aim of this book to summarize data on the fungal impact on biodeterioration processes. The aim of this work was to study the microfungi community on biodeteriorated samples originating from some historical buildings/tempels by using cultivation and microscope observations in order to evaluate the potential damage caused by fungal species. Most part of the book describes biodeterioration by fungi. This book especially emphasizes the frequency & contribution of fungi in biodeteriorated parts. The book is intended for archeologists, enginners, researchers, and students of environment science.

Bioactive Compounds in Nutraceutical and Functional Food for Good Human Health (Hardcover): Kavita Sharma, Kanchan Mishra, Kula... Bioactive Compounds in Nutraceutical and Functional Food for Good Human Health (Hardcover)
Kavita Sharma, Kanchan Mishra, Kula Kamal Senapati, Corina Danciu
R4,370 R4,008 Discovery Miles 40 080 Save R362 (8%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mellerware Plastic Oscilating Floor Fan…
 (2)
R552 Discovery Miles 5 520
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger Blu-ray disc  (1)
R79 Discovery Miles 790
Sylvanian Families Country Tree School
 (7)
R2,759 Discovery Miles 27 590
Jumbo Puzzle Mates Puzzle & Roll Storage…
 (4)
R699 R639 Discovery Miles 6 390
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,399 Discovery Miles 23 990
One Hundred Years Of Dispossession - My…
Lebogang Seale Paperback R320 R235 Discovery Miles 2 350
Boucheron Quatre Eau De Parfum Spray…
R1,825 Discovery Miles 18 250
Estee Lauder Beautiful Belle Eau De…
R2,241 R1,652 Discovery Miles 16 520
JBL T110 In-Ear Headphones (Black)
 (13)
R229 R201 Discovery Miles 2 010
Mountain Backgammon - The Classic Game…
Lily Dyu R575 R460 Discovery Miles 4 600

 

Partners