Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
The dual goal of the "Handbook in Information Systems" is to provide a reference for the diversity of research in the field by scholars from many disciplines, as well as to stimulate new research. This volume, focusing on Information Assurance, Security and Privacy Services, consists of six sections. In the first part contributors discuss Program Security, Data Security and Authentication, while the second section covers Internet Scourges and Web Security. Parts two and three concentrate on Usable Security and Human-Centric Aspects, along with Security, Privacy and Access Control whereas the final sections of the book examine Economic Aspects of Security, and Threat Modeling, Intrusion and Response.
Mobil Computing: Implementing Pervasive Information and
Communication Technologies is designed to address some of the
business and technical challenges of pervasive computing that
encompass current and emerging technology standards,
infrastructures and architectures, and innovative and high impact
applications of mobile technologies in virtual enterprises. The
various articles examine a host of issues including: the challenges
and current solutions in mobile connectivity and coordination;
management infrastructures; innovative architectures for fourth
generation wireless and Ad-hoc networks; error-free frequency
assignments for wireless communication; cost-effective wavelength
assignments in optical communication networks; data and transaction
modeling in a mobile environment, and bandwidth issues and data
routing in mobile Ad-hoc networks.
Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.
|
You may like...
How Did We Get Here? - A Girl's Guide to…
Mpoomy Ledwaba
Paperback
(1)
|