|
Showing 1 - 14 of
14 matches in All Departments
|
It Is as It Is (Hardcover)
David Brazier, Ruby Lee
|
R2,110
R1,652
Discovery Miles 16 520
Save R458 (22%)
|
Ships in 10 - 15 working days
|
Aim: Provides an in-depth and holistic view of security and
solutions from practical to theoretical aspects.Covering topics
that are equally valuable for practitioners as well as those new in
the field. Scope: This journal covers security issues in cyber
space and solutions thereof. As cyber space has moved towards the
wireless/mobile world, issues in wireless/mobile communications
will also be published. The publication will take a holistic view.
Some example topics are: security in mobile networks, security and
mobility optimization, cyber security, cloud security, Internet of
Things (IoT) and machine-to-machine technologies.
Aim: Provides an in-depth and holistic view of security and
solutions from practical to theoretical aspects.Covering topics
that are equally valuable for practitioners as well as those new in
the field. Scope: This journal covers security issues in cyber
space and solutions thereof. As cyber space has moved towards the
wireless/mobile world, issues in wireless/mobile communications
will also be published. The publication will take a holistic view.
Some example topics are: security in mobile networks, security and
mobility optimization, cyber security, cloud security, Internet of
Things (IoT) and machine-to-machine technologies.
Aim: Provides an in-depth and holistic view of security and
solutions from practical to theoretical aspects. Covering topics
that are equally valuable for practitioners as well as those new in
the field. Scope: This journal covers security issues in cyber
space and solutions thereof. As cyber space has moved towards the
wireless/mobile world, issues in wireless/mobile communications
will also be published. The publication will take a holistic view.
Some example topics are: security in mobile networks, security and
mobility optimization, cyber security, cloud security, Internet of
Things (IoT) and machine-to-machine technologies.
Aim: Provides an in-depth and holistic view of security and
solutions from practical to theoretical aspects. Covering topics
that are equally valuable for practitioners as well as those new in
the field. Scope: This journal covers security issues in cyber
space and solutions thereof. As cyber space has moved towards the
wireless/mobile world, issues in wireless/mobile communications
will also be published. The publication will take a holistic view.
Some example topics are: security in mobile networks, security and
mobility optimization, cyber security, cloud security, Internet of
Things (IoT) and machine-to-machine technologies.
|
|