0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Quantum Computing Fundamentals (Paperback): William (Chuck) Easttom II Quantum Computing Fundamentals (Paperback)
William (Chuck) Easttom II
R1,537 Discovery Miles 15 370 Ships in 9 - 15 working days

ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTING Clearly explains core concepts, terminology, and techniques Covers the foundational physics, math, and information theory you need Provides hands-on practice with quantum programming The perfect beginner's guide for anyone interested in a quantum computing career Dr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started. Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field's underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their implications for cyber security, and previews advances in quantum-resistant cryptography. Writing clearly and simply, he introduces two of today's leading quantum programming languages, Microsoft Q# and QASM, and guides you through sample projects. Throughout, tests, projects, and review questions help you deepen and apply your knowledge. Whether you're a student, professional, or manager, this guide will prepare you for the quantum computing revolution--and expand your career options, too. Master the linear algebra and other mathematical skills you'll need Explore key physics ideas such as quantum states and uncertainty Review data structures, algorithms, and computing complexity Work with probability and set theory in quantum computing Familiarize yourself with basic quantum theory and formulae Understand quantum entanglement and quantum key distribution Discover how quantum computers are architected and built Explore several leading quantum algorithms Compare quantum and conventional asymmetric algorithms See how quantum computing might break traditional cryptography Discover several approaches to quantum-resistant cryptography Start coding with Q#, Microsoft's quantum programming language Simulate quantum gates and algorithms with QASM

Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition): William (Chuck) Easttom Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition)
William (Chuck) Easttom
R2,158 Discovery Miles 21 580 Ships in 9 - 15 working days

All you need to know about defending networks, in one book * Clearly explains concepts, terminology, challenges, tools, and skills * Covers key security standards and models for business and government * The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career. Learn How To * Evaluate key network risks and dangers * Choose the right network security approach for your organization * Anticipate and counter widespread network attacks, including those based on "social engineering" * Successfully deploy and apply firewalls and intrusion detection systems * Secure network communication with virtual private networks * Protect data with cryptographic public/private key systems, digital signatures, and certificates * Defend against malware, including ransomware, Trojan horses, and spyware * Harden operating systems and keep their security up to date * Define and implement security policies that reduce risk * Explore leading security standards and models, including ISO and NIST standards * Prepare for an investigation if your network has been attacked * &nb

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Glu Dots - Extra Strength (64…
R55 Discovery Miles 550
Sony NEW Playstation Dualshock 4 v2…
 (22)
R1,484 Discovery Miles 14 840
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Shield Fresh 24 Air Freshener (Fireworx)
R53 Discovery Miles 530
Croxley Create Wood Free Colouring…
R29 Discovery Miles 290
Mellerware Aquillo Desktop Fan (White…
R597 Discovery Miles 5 970
Mellerware Essentials - Ironing Board…
 (5)
R499 R399 Discovery Miles 3 990
Bostik Super Clear Tape on Dispenser…
R44 Discovery Miles 440
Pet Mall Mattress Style Pet Bed…
R2,339 Discovery Miles 23 390
A Little Light - Stories
Nthikeng Mohlele Paperback R220 R110 Discovery Miles 1 100

 

Partners