0
Your cart

Your cart is empty

Browse All departments
  • All departments
Price
Status
Brand

Showing 1 - 25 of 34 matches in All departments

LEGO  DC SUPERHEROES Friends and Foes (Paperback): Trey King LEGO DC SUPERHEROES Friends and Foes (Paperback)
Trey King; Illustrated by Sean Wang 1
R133 R102 Discovery Miles 1 020 Save R31 (23%) Ships in 10 - 15 working days

This hilarious and action-packed picture book is perfect for young LEGO DC Super Heroes fans! Experience Superman, Batman, Wonder Woman, and the whole DC Comics Universe like you've never experienced them before - LEGO style! Gotham City is under attack by super-villains. Batman and Superman have to stop them. But when they get into trouble, who can help the heroes? This calls for an extra-special hero. Or maybe two - Batgirl and Wonder Woman! An all-new adventure starring the biggest LEGO DC superheroes and villains Full-colour picture book format

Friends and Foes! (Lego DC Super Heroes) (Paperback): Trey King Friends and Foes! (Lego DC Super Heroes) (Paperback)
Trey King; Illustrated by Sean Wang
R115 R95 Discovery Miles 950 Save R20 (17%) Ships in 5 - 10 working days
Carnival Capers! (Paperback): Eric Esquivel Carnival Capers! (Paperback)
Eric Esquivel; Illustrated by Sean Wang 1
R140 R116 Discovery Miles 1 160 Save R24 (17%) Ships in 5 - 10 working days
Mystery on the Lego Express (Hardcover, Bound for Schools & Libraries ed.): Trey King Mystery on the Lego Express (Hardcover, Bound for Schools & Libraries ed.)
Trey King; Illustrated by Sean Wang
R298 R278 Discovery Miles 2 780 Save R20 (7%) Ships in 7 - 11 working days

All aboard Time to take a wild ride on the LEGO(R) Express train
When a famous actress loses her award statue on the LEGO Express, it is up to Mr. Clue to solve this action-packed and hilarious mystery-adventure

Catch That Crook! (Hardcover, Bound for Schools & Libraries ed.): Michael Anthony Steele Catch That Crook! (Hardcover, Bound for Schools & Libraries ed.)
Michael Anthony Steele; Illustrated by Sean Wang
R298 R278 Discovery Miles 2 780 Save R20 (7%) Ships in 7 - 11 working days

Reading is always fun in Lego City
A thief thinks he's found the perfect hiding spot after his latest heist: the LEGO City forest. But he wasn't counting on the Forest Police It's a madcap chase of cops and robbers in this LEGO City 8x8

LEGO CITY: Halloween Rescue! (Paperback): Trey King LEGO CITY: Halloween Rescue! (Paperback)
Trey King; Illustrated by Sean Wang 1
R133 R103 Discovery Miles 1 030 Save R30 (23%) Ships in 10 - 15 working days

The LEGO(R) City Fire Department is always ready for an emergency! But this year they're going to get a little unexpected help from two creatures that could only come out on this very special Halloween! This hilarious picture book with bright LEGO (R) artwork includes large colour pictures and simple text in captions, set in the exciting world of LEGO (R) City! With sticker sheet - perfect for any little LEGO fan's library!

LEGO DC Comics Super Heroes: Sidekick Showdown! (Paperback): Trey King LEGO DC Comics Super Heroes: Sidekick Showdown! (Paperback)
Trey King; Illustrated by Sean Wang 1
R88 R74 Discovery Miles 740 Save R14 (16%) Ships in 7 - 11 working days

When Harley Quinn(TM) and her friends capture Superman(TM), Batman(TM) and Wonder Woman(TM), it's up to their sidekicks to save the day! Robin(TM), Batgirl(TM), and Supergirl(TM) willl have to use teamwork and friendship to get the job done-but will it be enough?!

Stop That Train! (Paperback): Ace Landers Stop That Train! (Paperback)
Ace Landers; Illustrated by Sean Wang 1
R140 R116 Discovery Miles 1 160 Save R24 (17%) Ships in 5 - 10 working days

There's never a dull moment in LEGO(R) City in this illustrated storybook that includes an exclusive foldout poster! A young man must get from one end of LEGO(R) City to the other for an important event, but his train leaves without him! He hops aboard a cargo train instead. But he doesn't count on delays like fallen cargo and a pig crossing! Will he be able to chase down his train and make it in time?

Lego DC Super Heroes: !amigos Y Enemigos! (Friends and Foes) (English, Spanish, Paperback): Trey King Lego DC Super Heroes: !amigos Y Enemigos! (Friends and Foes) (English, Spanish, Paperback)
Trey King; Illustrated by Sean Wang
R84 R69 Discovery Miles 690 Save R15 (18%) Ships in 7 - 11 working days
Amigos Y Enemigos! (Friends and Foes) (English, Spanish, Hardcover, Bound for Schools & Libraries ed.): Trey King Amigos Y Enemigos! (Friends and Foes) (English, Spanish, Hardcover, Bound for Schools & Libraries ed.)
Trey King; Illustrated by Sean Wang
R298 R278 Discovery Miles 2 780 Save R20 (7%) Ships in 7 - 11 working days
Lego City: Halloween Rescue (Paperback): Trey King Lego City: Halloween Rescue (Paperback)
Trey King; Illustrated by Sean Wang 1
R140 R116 Discovery Miles 1 160 Save R24 (17%) Ships in 5 - 10 working days

It's Halloween in LEGO(R) City This 8x8 includes stickers
The fun never stops in LEGO(R) City--especially not at the fire station's Halloween Party But when a fire threatens an abandoned home, will it be the ghosts and ghouls who help the fire department to save the day?

Advances in Data and Web Management - Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009,... Advances in Data and Web Management - Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009, Proceedings (Paperback, 2009 ed.)
Qing Li, Ling Feng, Jian Pei, X.Sean Wang, Xiaofang Zhou, …
R2,742 R2,120 Discovery Miles 21 200 Save R622 (23%) Ships in 10 - 15 working days

This book constitutes the proceedings of the joint International Conference APWeb/WAIM 2009 which was held in Suzhou, China, during April 1-4, 2009.

The 42 full papers presented together with 26 short papers and the abstracts of 2 keynote speeches were carefully reviewed and selected for inclusion in the book. The topics covered are query processing, topic-based techniques, Web data processing, multidimensional data analysis, stream data processing, data mining and its applications, and data management support to advanced applications.

LEGO DC Comics Super Heroes: Race Around the World (Paperback): Trey King LEGO DC Comics Super Heroes: Race Around the World (Paperback)
Trey King; Illustrated by Sean Wang
R115 R95 Discovery Miles 950 Save R20 (17%) Ships in 5 - 10 working days
Time Granularities in Databases, Data Mining, and Temporal Reasoning (Hardcover, 2000 ed.): Claudio Bettini, Sushil Jajodia,... Time Granularities in Databases, Data Mining, and Temporal Reasoning (Hardcover, 2000 ed.)
Claudio Bettini, Sushil Jajodia, Sean Wang
R2,851 R2,303 Discovery Miles 23 030 Save R548 (19%) Ships in 10 - 15 working days

Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play a major role in a wide range of information system applications. System support for reasoning about these units, called granularities in this book, is important for the efficient design, use, and implementation of such applications. The book deals with several aspects of temporal information and provides a unifying model for granularities. It is intended for computer scientists and engineers who are interested in the formal models and technical development of specific issues. Practitioners can learn about critical aspects that must be taken into account when designing and implementing databases supporting temporal information. Lecturers may find this book useful for an advanced course on databases. Moreover, any graduate student working on time representation and reasoning, either in data or knowledge bases, should definitely read it.

Web Information Systems Engineering - WISE 2008 - 9th International Conference, Auckland, New Zealand, September 1-3, 2008,... Web Information Systems Engineering - WISE 2008 - 9th International Conference, Auckland, New Zealand, September 1-3, 2008, Proceedings (Paperback, 2008 ed.)
James Bailey, David Maier, Klaus-Dieter Schewe, Bernhard Thalheim, X.Sean Wang
R2,274 R1,849 Discovery Miles 18 490 Save R425 (19%) Ships in 10 - 15 working days

WISE 2008 was held in Auckland, New Zealand, during September 1-3, at The Auckland University ofTechnology City Campus Conference Centre. The aim of this conferencewasto providean internationalforum for researchers, professi- als, and industrial practitioners to share their knowledge in the rapidly growing area of Web technologies, methodologies, and applications. Previous WISE c- ferences wereheld in Hong Kong, China (2000), Kyoto, Japan (2001), Singapore (2002), Rome, Italy (2003), Brisbane, Australia (2004), New York, USA (2005), Wuhan, China (2006) and Nancy, France (2007). The call for papers created considerable interest. Around 110 paper s- missions were received and the international Program Committee selected 31 papers out of the 110 submissions (an acceptance rate of 28. 2%). Of these, 17 papers were chosen for standard presentation and the remaining 14 papers for short presentation. The authors of the accepted papers range across 13 co- tries: Australia, China, Germany, Greece, Italy, Japan, Korea, New Zealand, Poland, Singapore, Spain, Switzerland and the USA. The technical track of the WISE 2008 program o?ered nine paper presentation sessions. The selected - pers covered a wide and important variety of issues in Web information systems engineering such as querying; search; ranking; trust; peer-to-peer networks; - formation ?ltering; information integration; agents and mining. A few selected papers from WISE 2008 will be published in a special issue of the World Wide Web Journal, bySpringer. Inaddition, a $1000prizewasawardedto the authors ofthepaperselectedforthe"YahikoKambayashiBestPaperAward. "Wethank all authors who submitted their papers and the Program Committee members andexternalreviewersfor their excellent work.

LEGO City: Wrecking Valentine's Day! (Paperback): Trey King LEGO City: Wrecking Valentine's Day! (Paperback)
Trey King; Illustrated by Sean Wang 1
R110 R91 Discovery Miles 910 Save R19 (17%) Ships in 5 - 10 working days
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,787 R2,487 Discovery Miles 24 870 Save R300 (11%) Ships in 10 - 15 working days

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,150 Discovery Miles 31 500 Ships in 7 - 11 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,314 Discovery Miles 23 140 Ships in 7 - 11 working days

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,490 Discovery Miles 14 900 Ships in 7 - 11 working days

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Web Information Systems Engineering - WISE 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012,... Web Information Systems Engineering - WISE 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012, Proceedings (Paperback, 2012 ed.)
X.Sean Wang, Isabel Cruz, Alex Delis, Guangyan Huang
R2,596 Discovery Miles 25 960 Ships in 7 - 11 working days

This book constitutes the proceedings of the 13th International Conference on Web Information Systems Engineering, WISE 2012, held in Paphos, Cyprus, in November 2012. The 44 full papers, 13 short papers, 9 demonstrations papers and 9 "challenge" papers were carefully reviewed and selected from 194 submissions. The papers cover various topics in the field of Web Information Systems Engineering.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,263 Discovery Miles 32 630 Ships in 7 - 11 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Time Granularities in Databases, Data Mining, and Temporal Reasoning (Paperback, Softcover reprint of the original 1st ed.... Time Granularities in Databases, Data Mining, and Temporal Reasoning (Paperback, Softcover reprint of the original 1st ed. 2000)
Claudio Bettini, Sushil Jajodia, Sean Wang
R2,299 Discovery Miles 22 990 Ships in 7 - 11 working days

Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play a major role in a wide range of information system applications. System support for reasoning about these units, called granularities in this book, is important for the efficient design, use, and implementation of such applications. The book deals with several aspects of temporal information and provides a unifying model for granularities. It is intended for computer scientists and engineers who are interested in the formal models and technical development of specific issues. Practitioners can learn about critical aspects that must be taken into account when designing and implementing databases supporting temporal information. Lecturers may find this book useful for an advanced course on databases. Moreover, any graduate student working on time representation and reasoning, either in data or knowledge bases, should definitely read it.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R3,137 Discovery Miles 31 370 Ships in 7 - 11 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.): Peng Ning, Sushil Jajodia,... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,440 Discovery Miles 14 400 Ships in 7 - 11 working days

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (a user or a system); any action that significantly deviates from the normal behaviour is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modelling requests among co-operative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Crayola Coloured Pencil Crayons (Pack of…
R143 Discovery Miles 1 430
A House Divided - The Feud That Took…
Crispian Olver Paperback  (2)
R275 R220 Discovery Miles 2 200
Microsoft Xbox One S Console (1TB)
 (13)
R6,999 Discovery Miles 69 990
JBL C100SI Headset In-ear Black
R149 R129 Discovery Miles 1 290
Tranquility Base Hotel & Casino
Arctic Monkeys CD R118 R60 Discovery Miles 600
Pineware Steam, Spray, Dry Iron (1400W)
R203 Discovery Miles 2 030
Dunlop Stage 2 Orange Tennis Balls (3…
R110 R99 Discovery Miles 990
Karcher Paper Bag for SE 4001, WD 3, WD…
R199 Discovery Miles 1 990
Similac® Isomil Soy-Protein Based Infant…
R262 Discovery Miles 2 620
Simply Child Hot Air Balloon Mobile…
R390 R99 Discovery Miles 990

 

Partners