0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (4)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Cybercrimes: A Multidisciplinary Analysis (Hardcover, 2011 ed.): Sumit Ghosh, Elliot Turrini Cybercrimes: A Multidisciplinary Analysis (Hardcover, 2011 ed.)
Sumit Ghosh, Elliot Turrini
R5,681 Discovery Miles 56 810 Ships in 10 - 15 working days

Designed to serve as a reference work for practitioners, academics, and scholars worldwide, this book is the first of its kind to explain complex cybercrimes from the perspectives of multiple disciplines (computer science, law, economics, psychology, etc.) and scientifically analyze their impact on individuals, society, and nations holistically and comprehensively. In particular, the book shows: How multiple disciplines concurrently bring out the complex, subtle, and elusive nature of cybercrimes How cybercrimes will affect every human endeavor, at the level of individuals, societies, and nations How to legislate proactive cyberlaws, building on a fundamental grasp of computers and networking, and stop reacting to every new cyberattack How conventional laws and traditional thinking fall short in protecting us from cybercrimes How we may be able to transform the destructive potential of cybercrimes into amazing innovations in cyberspace that can lead to explosive technological growth and prosperity

Algorithm Design for Networked Information Technology Systems (Hardcover, 2004 ed.): C.V. Ramamoorthy Algorithm Design for Networked Information Technology Systems (Hardcover, 2004 ed.)
C.V. Ramamoorthy; Sumit Ghosh
R2,870 Discovery Miles 28 700 Ships in 10 - 15 working days

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation systems, and remote data acquisition and control to the present-day e-commerce and distance learning to tomorrow's patient medical records, remote surgery, intelligent transportation systems, and communications and control in deep space. To date, however, the design and development of NIT systems have been ad-hoc, and lacking a scientific theory. A new text presents a scientific theory of NIT systems and logically develops the fundamental principles to help synthesize control algorithms for these systems. The algorithms are referred to as asynchronous, distributed decision-making (ADDM) algorithms, and their characteristics include correct operation, robustness, reliability, scalability, stability, and performance. The book explains through several case studies and actual research the conception, development, experimental testing, validation, and rigorous performance analysis of practical ADDM algorithms for real-world systems from a number of diverse disciplines. It concludes by exploring the benefits and impact of ADDM algorithms in the future. Topics and features: *develops a logical yet practical approach to synthesizing ADDM algorithms for NIT systems *addresses design of NIT systems using a scientific manner *essential for NIT engineers who plan to design, build, deploy, maintain, and evolve NIT systems that span virtually every aspect of human behavior *includes actual case studies to help readers develop clarity and application of key principles

Principles of Secure Network Systems Design (Hardcover, 2002 ed.): H. Lawson Principles of Secure Network Systems Design (Hardcover, 2002 ed.)
H. Lawson; Sumit Ghosh
R1,484 Discovery Miles 14 840 Ships in 10 - 15 working days

This new book establishes a comprehensive framework for network security design, unifying the many concepts and aspects of network security and enabling all users to employ a common security foundation. It is presented from the perspective of fundamental principles underlying networking, network control algorithms and security. Using an accessible style and careful explanations, the principles and methodology address design concepts for current and future security concerns for networks. "Principles of Secure Network Systems Design" presents the topic in three basic parts. Part one covers the basic background of network security and the current scope for security in all types of networks and organizations. Part two focuses on the essential nature of network security and a scientific methodology for secure network design. Lastly, part three discusses concrete applications of the design concepts with real world networks, using three comprehensive case studies oriented around ATM networks. Topics and Features: * Holistic view of network security design, going beyond cryptographic issues * Comprehensive framework for a scientific basis of network security design * Integrated view of network security with networks¿ operational and management processes * Extensive case study through modeling & large-scale distributed simulation of ATM network * New approach to both security attack detection and strengthening networks against security attacks and vulnerabilities The book is an essential and practical resource for all professionals, policy makers, practitioners, and advanced students in networking, information systems, computer engineering & science, communications engineering, network design, and security consultants seeking a comprehensive framework for secure network systems design. It is also suitable for self-study purposes by professionals, as well as for advanced course use in network security.

Intelligent Transportation Systems - Smart and Green Infrastructure Design, Second Edition (Hardcover, 2nd edition): Sumit... Intelligent Transportation Systems - Smart and Green Infrastructure Design, Second Edition (Hardcover, 2nd edition)
Sumit Ghosh, Tony S. Lee
R4,443 Discovery Miles 44 430 Ships in 12 - 17 working days

For many transportation systems, the cost of expanding the infrastructure is too high. Therefore, the focus must shift to improving the quality of transportation within the existing infrastructure. The second edition of a bestseller, Intelligent Transport Systems: Smart and Green Infrastructure Design critically examines the successes and failures of intelligent transportation systems (ITS) during the course of the past decade. The new subtitle reflects this edition s focus on meta-principles critical to moving ahead and successfully building ITS infrastructures that take advantage of smart/green technologies. The book identifies challenging problems that must be addressed in order to bring real quality of life improvements and positively impact our environmental and civil infrastructure systems.

New in the second edition:

  • Coverage of new, efficient green strategies
  • Critical review of important developments and implementation of ITS
  • Discussion of how to apply new insights and meta-principles to real-world ITS problems

The authors argue strongly for the need to incorporate innovative and creative approaches to transportation problems, based on the fundamental principles and thorough scientific validation. They stress the need for computer modeling and simulation of a representative system to help design and validate such complex, large-scale systems, and the design of new performance metrics to estimate the performance of these systems. They provide a radically different approach to transportation systems design one that closely resembles reality and promises to yield an architecture that delivers the highest efficiency.

Cybercrimes: A Multidisciplinary Analysis (Paperback, 2011 ed.): Sumit Ghosh, Elliot Turrini Cybercrimes: A Multidisciplinary Analysis (Paperback, 2011 ed.)
Sumit Ghosh, Elliot Turrini
R5,469 Discovery Miles 54 690 Ships in 10 - 15 working days

Designed to serve as a reference work for practitioners, academics, and scholars worldwide, this book is the first of its kind to explain complex cybercrimes from the perspectives of multiple disciplines (computer science, law, economics, psychology, etc.) and scientifically analyze their impact on individuals, society, and nations holistically and comprehensively. In particular, the book shows: How multiple disciplines concurrently bring out the complex, subtle, and elusive nature of cybercrimes How cybercrimes will affect every human endeavor, at the level of individuals, societies, and nations How to legislate proactive cyberlaws, building on a fundamental grasp of computers and networking, and stop reacting to every new cyberattack How conventional laws and traditional thinking fall short in protecting us from cybercrimes How we may be able to transform the destructive potential of cybercrimes into amazing innovations in cyberspace that can lead to explosive technological growth and prosperity

Algorithm Design for Networked Information Technology Systems (Paperback, Softcover reprint of the original 1st ed. 2004): C.V.... Algorithm Design for Networked Information Technology Systems (Paperback, Softcover reprint of the original 1st ed. 2004)
C.V. Ramamoorthy; Sumit Ghosh
R2,832 Discovery Miles 28 320 Ships in 10 - 15 working days

I felt deeply honored when Professor Sumit Ghosh asked me to write the foreword to his book with an extraordinary perspective. I have long admired him, ?rst as a student leader at Stanford, where he initiated the ?rst IEEE Computer Society's student chapter, and later as an esteemed and inspiring friend whose transdisciplinary research broadened and enhanced the horizons of practitioners of computer science and engineering, including my own. His ideas, which are derived from his profound vision, deep critical thinking, and personal intuition, reach from information technology to bioscience, as - hibited in this excellent book. To me, an ordinary engineer, it opens up a panoramic view of the Universe of Knowledge that keeps expanding and - spiring,likethegoodIndianproverb,whichsays,"agoodbookinformsyou,an excellent book teaches you, and a great book changes you. " I sincerely believe that Professor Ghosh's book will help us change and advance the methods of systems engineering and technology. Vision Inspired vision sees ahead of others what will or may come to be, a vivid, imagined concept or anticipation. An inspired vision personi?es what is good and what like-minded individuals hope for. Our vision is one of creating an Internet of minds, where minds are Web sites or knowledge centers, which create, store, and radiate knowledge through interaction with other minds connected by a universal shared network. This vision will not just hasten the death of distance, but will also - carcerate ignorance.

Guarding Your Business - A Management Approach to Security (Paperback, Softcover reprint of the original 1st ed. 2004): Manu... Guarding Your Business - A Management Approach to Security (Paperback, Softcover reprint of the original 1st ed. 2004)
Manu Malek, Sumit Ghosh, Edward A. Stohr
R1,472 Discovery Miles 14 720 Ships in 10 - 15 working days

Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?

Principles of Secure Network Systems Design (Paperback, Softcover reprint of the original 1st ed. 2002): H. Lawson Principles of Secure Network Systems Design (Paperback, Softcover reprint of the original 1st ed. 2002)
H. Lawson; Sumit Ghosh
R1,453 Discovery Miles 14 530 Ships in 10 - 15 working days

A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.

Plant Gene Silencing - Mechanisms and Applications (Hardcover): Tamas Dalmay Plant Gene Silencing - Mechanisms and Applications (Hardcover)
Tamas Dalmay; Contributions by Alberto Carbonell, Heriberto Cerutti, Soumita Das, Asis Datta, …
R2,617 Discovery Miles 26 170 Ships in 12 - 17 working days

Plant gene silencing is a crucially important phenomenon in gene expression and epigenetics. This book describes the way small RNA is produced and acts to silence genes, its likely origins in defence against viruses, and also its potential to improve plants. Plant gene silencing can be used to improve industrial traits, make plants more nutritious or more valuable to consumers, to remove allergens, and to improve resistance to weeds and pathogens.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Milex Rechargeable Pedestal Fan (16…
R1,599 R1,499 Discovery Miles 14 990
Mother's Choice Baby Mink Blanket Bear
R899 R699 Discovery Miles 6 990
Expensive Poverty - Why Aid Fails And…
Greg Mills Paperback R360 R309 Discovery Miles 3 090
Mountain Backgammon - The Classic Game…
Lily Dyu R575 R460 Discovery Miles 4 600
Britney Spears Fantasy Eau De Parfum…
R1,037 R507 Discovery Miles 5 070
Professor Snape Wizard Wand - In…
 (8)
R801 Discovery Miles 8 010
Elecstor 18W In-Line UPS (Black)
R999 R404 Discovery Miles 4 040
Bantex McCasey 2 PP Pencil Case…
 (2)
R83 Discovery Miles 830
The Papery A5 MOM 2025 Diary - Giraffe
R349 R300 Discovery Miles 3 000
Endless Summer Vacation
Miley Cyrus CD R246 R207 Discovery Miles 2 070

 

Partners