0
Your cart

Your cart is empty

Browse All departments
Price
  • R50 - R100 (13)
  • R100 - R250 (1,849)
  • R250 - R500 (1,279)
  • R500+ (12,759)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

CISA Certified Information Systems Auditor Study Guide (Paperback, 4th Edition): David L Cannon, Brian T. O'Hara, Allen... CISA Certified Information Systems Auditor Study Guide (Paperback, 4th Edition)
David L Cannon, Brian T. O'Hara, Allen Keele
R1,256 R812 Discovery Miles 8 120 Save R444 (35%) Shipped within 7 - 12 working days

The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. * Discover how much you already know by beginning with an assessment test * Understand all content, knowledge, and tasks covered by the CISA exam * Get more in-depths explanation and demonstrations with an all-new training video * Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.

Network+ Guide to Networks - International Edition (Paperback, 6th edition): Tamara Dean Network+ Guide to Networks - International Edition (Paperback, 6th edition)
Tamara Dean
R737 R99 Discovery Miles 990 Save R638 (87%) In stock

The completely updated NETWORK+ GUIDE TO NETWORKS, International Edition gives readers the technical skills and industry know-how required to begin an exciting career installing, configuring, and troubleshooting computer networks. The text also prepares readers for CompTIA's Network+ N10-005 certification exam with fundamentals in protocols, topologies, hardware, and network design.

After exploring TCP/IP, Ethernet, wireless transmission, and security concepts, as well as an all-new chapter on virtual networks, readers can increase their knowledge with the practical "On-the Job" stories, Review Questions, Hands-On Projects, and Case Projects.

NETWORK+ GUIDE TO NETWORKS, International Edition also includes reference appendices, a glossary, and full-color illustrations. The features of the text combined with its emphasis on real-world problem solving, provides readers with the tools they need to succeed in any computing environment.

Network+ Guide to Networks (Paperback, 7th edition): Jill West, Tamara Dean, Jean Andrews Network+ Guide to Networks (Paperback, 7th edition)
Jill West, Tamara Dean, Jean Andrews
R743 R556 Discovery Miles 5 560 Save R187 (25%) Shipped within 8 - 13 working days

Master the technical skills and industry know-how to begin an exciting career installing, configuring, and troubleshooting computer networks with the completely updated NETWORK+ GUIDE TO NETWORKS, 7E. You can prepare for success on CompTIA's Network+ N10-006 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, and troubleshooting. This edition addresses today's latest technology with new features that make essential information easily accessible and help you visualize high-level concepts. New OSI layer icons visually link concepts and the OSI model. New and updated "On the Job" stories, Applying Concepts activities, Hands-On and Case Projects let you explore concepts in more depth. The NETWORK+ GUIDE TO NETWORKS, 7E's emphasis on real-world problem solving provides the tools you need to succeed in any computing environment.

Guide to Network Defense and Countermeasures, International Edition (Paperback, 3rd edition): Randy Weaver, Dean Farwood, Dawn... Guide to Network Defense and Countermeasures, International Edition (Paperback, 3rd edition)
Randy Weaver, Dean Farwood, Dawn Weaver
R978 R824 Discovery Miles 8 240 Save R154 (16%) Shipped within 8 - 13 working days

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional.

Network+ Guide to Networks (Paperback, 8th edition): Jill West, Jean Andrews, Tamara Dean Network+ Guide to Networks (Paperback, 8th edition)
Jill West, Jean Andrews, Tamara Dean
R817 R697 Discovery Miles 6 970 Save R120 (15%) Shipped within 8 - 13 working days

Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West/Dean/Andrews' NETWORK+ GUIDE TO NETWORKS, 8th edition. It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, security and troubleshooting. Virtualization-based projects give you experience working with a wide variety of hardware, software, operating systems and device interactions, while "On the Job" stories, Applying Concepts activities, and Hands-On and Capstone Projects let you explore concepts in more depth. MindTap Networking offers additional practice and certification prep. The text's emphasis on real-world problem solving provides the tools for success in any computing environment.

Data Communications and Computer Networks - A Business User's Approach (Hardcover, 8th edition): Curt M. White Data Communications and Computer Networks - A Business User's Approach (Hardcover, 8th edition)
Curt M. White
R835 R711 Discovery Miles 7 110 Save R124 (15%) Shipped within 8 - 13 working days

Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough introduction that includes coverage of the language of computer networks as well as the effects of data communications on business and society. Balancing technical concepts with everyday issues, it equips you with a solid understanding of the basic features, operations, and limitations of different types of computer networks. It offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction. The Eighth Edition also offers up-to-the-minute coverage of near field communications, updated USB interface, lightning interface, and IEEE 802.11 ac and ad wireless standards, firewall updates, router security problems, the Internet of Things, cloud computing, zero-client workstations, and Internet domain names.

Tools and Weapons - Promise and Peril in the Digital Age (Hardcover): Brad Smith, Carol Ann Browne Tools and Weapons - Promise and Peril in the Digital Age (Hardcover)
Brad Smith, Carol Ann Browne 1
R472 R377 Discovery Miles 3 770 Save R95 (20%) Shipped within 7 - 12 working days

With a foreword from Bill Gates From Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitization of everything accelerates. __________ Microsoft President Brad Smith operates by a simple core belief: when your technology changes the world, you bear a responsibility to help address the world you have helped create. This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. Now, though, we have reached an inflection point: Silicon Valley has moved fast and it has broken things. A new understanding has emerged that companies that create technology must accept greater responsibility for the future. And governments will need to regulate technology by moving faster and catching up with the pace of innovation that is impacting our communities and changing the world. In Tools and Weapons, Brad Smith takes us into the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no pre-existing playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of AI, big tech's relationship to inequality and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book opens up the curtain remarkably wide onto some of the company's most crucial recent decision points, as it strives to protect the hopes technology offers against the very real threats it also presents. Every tool can be a weapon in the wrong person's hands, and companies are being challenged in entirely new ways to embrace the totality of their responsibilities. We have moved from a world in which Silicon Valley could take no prisoners to one in which tech companies and governments must work together to address the challenges and adapt to the changes technology has unleashed. There are huge ramifications to be thought through, and Brad Smith provides a marvellous and urgently necessary contribution to that effort.

Kingdom of Lies - Unnerving adventures in the world of cybercrime (Hardcover): Kate Fazzini Kingdom of Lies - Unnerving adventures in the world of cybercrime (Hardcover)
Kate Fazzini 1
R370 R290 Discovery Miles 2 900 Save R80 (22%) Pre-order

Would you say your phone is safe, or your computer? What about your car? Or your bank? There is a global war going on and the next target could be anyone, from a global corporation to a randomly selected person. From cybercrime villages in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history, and those committed to stopping them. You've never heard of them and you're not getting their real names. Kate Fazzini has met the hackers that create new cyberweapons, hack sports cars and develop ransomware capable of stopping international banks in their tracks. Kingdom of Lies is a fast-paced look at technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.

Tools And Weapons - The Promise And The Peril Of The Digital Age (Paperback): Brad Smith, Carol Ann Browne Tools And Weapons - The Promise And The Peril Of The Digital Age (Paperback)
Brad Smith, Carol Ann Browne; Foreword by Bill Gates 1
R325 R225 Discovery Miles 2 250 Save R100 (31%) Pre-order

*THE INSTANT NEW YORK TIMES BESTSELLER AND WORLD ECONOMIC FORUM BOOK CLUB PICK*

'A clear, compelling guide to some of the most pressing debates in technology today.' Bill Gates, from the foreword

'The de facto ambassador for the technology industry at large.' The New York Times

'One of the few executives willing to speak openly about the industry's most vexing issues.' Sunday Times

Microsoft President Brad Smith operates by a simple core belief: when your technology changes the world, you bear a responsibility to help address the world you have helped create.

This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation.

In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no pre-existing playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.

From Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitization of everything accelerates.

In Tools and Weapons, Brad Smith takes us behind the scenes on some of the biggest stories to hit the tech industry in the past decade and some of the biggest threats we face. From Edward Snowden's NSA leak to the NHS WannaCry ransomware attack, this book is essential reading to understand what's happening in the world around us.

If you watched Inside Bill's Brain: Decoding Bill Gates on Netflix, you will find Tools and Weapons equally fascinating.

'This is a colourful and insightful insiders' view of how technology is both empowering us and threatening us. From privacy to cyberattacks, this timely book is a useful guide for how to navigate the digital future.' Walter Isaacson, bestselling author of Steve Jobs

Online Security for the Older Generation (Paperback): Jim Gatenby Online Security for the Older Generation (Paperback)
Jim Gatenby
R236 R189 Discovery Miles 1 890 Save R47 (20%) Shipped within 7 - 12 working days
The Art of Invisibility - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data... The Art of Invisibility - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Paperback)
Kevin Mitnick 1
R215 R146 Discovery Miles 1 460 Save R69 (32%) Shipped within 7 - 12 working days

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

SharePoint 2019 For Dummies (Paperback): Ken Withee, Rosemarie Withee SharePoint 2019 For Dummies (Paperback)
Ken Withee, Rosemarie Withee 1
R591 R358 Discovery Miles 3 580 Save R233 (39%) Shipped within 7 - 12 working days

All you need to know about SharePoint Online and SharePoint Server 2019 SharePoint is an enterprise portal server living under the Microsoft Office umbrella. It can be used as a local installation (on-premises) or an online service. The SharePoint Online service comes bundled with Office 365. You can use SharePoint to aggregate sites, information, data, and applications into a single portal. SharePoint 2019 contains highly integrated features that allow you to work with it directly from other Office products such as Teams, Word, Excel, PowerPoint, and many others. SharePoint 2019 For Dummies provides a thorough update on how to make the most of all the new SharePoint and Office features--while still building on the great and well-reviewed content in the prior editions. The book shows those new to SharePoint or new to SharePoint 2019 how to get up and running so that you and your team can become productive with this powerful tool. Find high-level, need-to-know information for "techsumers," administrators, and admins Learn how SharePoint Online can get you started in minutes without the hassle and frustration of building out your own servers Find everything you need to know about the latest release of SharePoint Online and SharePoint Server 2019 Get your hands on the best guide on the market for SharePoint 2019!

Hacking Exposed Computer Forensics (Hardcover, 2nd ed.): Aaron Philipp Hacking Exposed Computer Forensics (Hardcover, 2nd ed.)
Aaron Philipp
R1,494 R1,125 Discovery Miles 11 250 Save R369 (25%) Shipped within 7 - 11 working days
Network+ Guide to Networks (Paperback, International ed of 5th revised ed): Tamara Dean Network+ Guide to Networks (Paperback, International ed of 5th revised ed)
Tamara Dean
R802 R99 Discovery Miles 990 Save R703 (88%) In stock

Knowing how to install, configure, and troubleshoot a computer network is a highly marketable and exciting skill. This book first introduces the fundamental building blocks that form a modern network, such as protocols, topologies, hardware, and network operating systems. It then provides in-depth coverage of the most important concepts in contemporary networking, such as TCP/IP, Ethernet, wireless transmission, and security. After reading the book and completing the end-of-chapter exercises, you will be prepared to select the best network design, hardware, and software for your environment. You will also have the skills to build a network from scratch and maintain, upgrade, and troubleshoot an existing network. Finally, you will be well prepared to pass CompTIA (the Computing Technology Industry Association) Network+ certification exam. This book explains concepts logically and in a clear, approachable style. In addition, concepts are reinforced by real-world examples of networking issues from a professionals standpoint. Each chapter opens with an On the Job story from a network engineer. These real-world examples, along with Hands-on Projects and Case Projects in each chapter, make this book a practical learning tool. The numerous tables and illustrations, along with the glossaries, appendices, and study questions make the book a valuable reference for any networking professional.

Business Data Communications and Networking (Paperback, 13th EMEA Edition): Jerry FitzGerald, Alan Dennis, Alexandra Durcikova Business Data Communications and Networking (Paperback, 13th EMEA Edition)
Jerry FitzGerald, Alan Dennis, Alexandra Durcikova
R1,048 R875 Discovery Miles 8 750 Save R173 (17%) Shipped within 7 - 13 working days
Email (Paperback): Randy Malamud Email (Paperback)
Randy Malamud
R229 R177 Discovery Miles 1 770 Save R52 (23%) Shipped within 7 - 12 working days

Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things. Do you feel your consciousness, your attention, and your intelligence (not to mention your eyesight) being sucked away, byte by byte, in a deadening tsunami of ill-composed blather, corporate groupthink, commercial come-ons, and other meaningless internet flotsam? Do your work life and your social life, hideously conjoined in your inbox, drag each other down in a surreal cycle of neverending reposts, appointments, and deadlines? Sometime in the mid-1990s, we began, often with some trepidation, to enroll for a service that promised to connect us-electronically and efficiently-to our friends and lovers, our bosses and merchants. If it seemed at first like simply a change in scale (our mail would be faster, cheaper, more easily distributed to large groups), we now realize that email entails a more fundamental alteration in our communicative consciousness. Despite its fading relevance in the lives of the younger generation in the face of an ever-changing array of apps and media, email is probably here to stay, for better or worse. Object Lessons is published in partnership with an essay series in The Atlantic.

BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback): Jenny Phillips, Alan... BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback)
Jenny Phillips, Alan Jarvis, Mark Fishpool, Richard McGill, Tim Cook, …
R718 Discovery Miles 7 180 Shipped within 7 - 11 working days

Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.

Linux Administration: A Beginners Guide (Paperback, 6th edition): Wale Soyinka Linux Administration: A Beginners Guide (Paperback, 6th edition)
Wale Soyinka
R896 R696 Discovery Miles 6 960 Save R200 (22%) Shipped within 7 - 11 working days

Essential Linux Management Skills Made Easy

Effectively deploy and maintain Linux and other Free and Open Source Software (FOSS) on your servers or entire network using this practical resource. "Linux Administration: A Beginner's Guide, Sixth Edition" provides up-to-date details on the latest Linux distributions, including Fedora, Red Hat Enterprise Linux, CentOS, Debian, and Ubuntu. Learn how to install and customize Linux, work from the GUI or command line, configure Internet and intranet services, interoperate with Windows systems, and create reliable backups. Performance tuning, security, and virtualization are also covered and real-world examples help you put the techniques presented into practice. "Install and configure popular Linux distributions, including the latest versions of Fedora, CentOS, openSUSE, Debian, and Ubuntu Administer Linux servers from the GUI or from the command line (shell) Manage users, permissions, folders, and native FOSS applications Compile, tune, upgrade, and customize the latest Linux kernel 3.x series Work with proc, SysFS, and cgroup file systems Understand and manage the Linux TCP/IP networking stack and services for both IPv4 and IPv6 Build robust firewalls, and routers using Netfilter and Linux Create and maintain print, e-mail, FTP, and web servers Use LDAP or NIS for identity management Set up and administer DNS, POP3, IMAP3, and DHCP servers Use GlusterFS, NFS, and Samba for sharing and distributing file system resources Explore and implement Linux virtualization technologies using KVM"

Oracle Exalogic Elastic Cloud Handbook (Paperback, Ed): Tom Plunkett, Tj Palazzolo, Tejas Joshi Oracle Exalogic Elastic Cloud Handbook (Paperback, Ed)
Tom Plunkett, Tj Palazzolo, Tejas Joshi
R1,023 R774 Discovery Miles 7 740 Save R249 (24%) Shipped within 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Achieve Extreme Application Performance for a Private Cloud with Oracle Exalogic Elastic Cloud Transition to a private cloud computing infrastructure and achieve unmatched levels of performance with help from this Oracle Press guide. Oracle Exalogic Elastic Cloud Handbook shows you how to plan, implement, and maintain a private cloud. Find out how to set up components, deploy Java applications, maximize redundancy and throughput, and migrate legacy workloads. Examples, screenshots, and diagrams are included throughout this comprehensive resource. Configure Oracle Exalogic Elastic Cloud nodes and racks Optimize Java EE application performance on Oracle WebLogic Server Provision and administer a highly scalable private cloud Build, debug, and manage custom Java applications Secure, monitor, and tune using Oracle Enterprise Manager Leverage capabilities from Oracle Fusion Middleware Consolidate Oracle and third-party application workloads

The Network Security Test Lab - A Step-by-Step Guide (Paperback): Michael Gregg The Network Security Test Lab - A Step-by-Step Guide (Paperback)
Michael Gregg
R932 R681 Discovery Miles 6 810 Save R251 (27%) Shipped within 7 - 13 working days

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills. Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers. * Get acquainted with your hardware, gear, and test platform * Learn how attackers penetrate existing security systems * Detect malicious activity and build effective defenses * Investigate and analyze attacks to inform defense strategy The Network Security Test Lab is your complete, essential guide.

Erfolgreich auf Instagram fur Dummies Junior (German, Paperback): Sonja Karmann Erfolgreich auf Instagram fur Dummies Junior (German, Paperback)
Sonja Karmann
R282 R261 Discovery Miles 2 610 Save R21 (7%) Shipped within 7 - 12 working days
Programming Kubernetes - Developing Cloud Native Applications (Paperback): Michael Hausenblas, Stefan Schimanski Programming Kubernetes - Developing Cloud Native Applications (Paperback)
Michael Hausenblas, Stefan Schimanski
R1,077 R693 Discovery Miles 6 930 Save R384 (36%) Shipped within 7 - 12 working days

While Kubernetes has established itself as the industry standard for managing containers and their life cycles, there's a definite need for good practices on how to write native applications. This practical guide shows application and infrastructure developers, DevOps practitioners, and site reliability engineers how to develop cloud native apps that run on Kubernetes. Red Hat's developer advocate Michael Hausenblas and senior software engineer Stefan Schimanski guide you through Kubernetes' basic building blocks including the client-go API library, custom resources, and cloud native programming languages. This intermediate-level book requires a minimum understanding of development and system administration tools and practices such as package management, the Go programming language, and using Git.

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Paperback, 8th Edition): Mike Chapple,... (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Paperback, 8th Edition)
Mike Chapple, James Michael. Stewart, Darril Gibson
R1,312 R868 Discovery Miles 8 680 Save R444 (34%) Shipped within 7 - 12 working days

CISSP Study Guide - fully updated for the 2018 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Six unique 150 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 700 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Network Attacks and Exploitation - A Framework (Paperback): Matthew Monte Network Attacks and Exploitation - A Framework (Paperback)
Matthew Monte
R820 R597 Discovery Miles 5 970 Save R223 (27%) Shipped within 7 - 13 working days

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them. * Understand the fundamental concepts of computer network exploitation * Learn the nature and tools of systematic attacks * Examine offensive strategy and how attackers will seek to maintain their advantage * Understand defensive strategy, and how current approaches fail to change the strategic balance Governments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offense or a strategically sound defense against attacks and exploitation. For a clear roadmap to better network security, Network Attacks and Exploitation is your complete and practical guide.

Protocols for Secure Electronic Commerce (Hardcover, 2nd New edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Hardcover, 2nd New edition)
Mostafa Hashem Sherif
R2,783 Discovery Miles 27 830 Shipped within 7 - 12 working days

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology.

The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money.

Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Official (ISC)2 Guide to the CISSP CBK
John Warsinske, Mark Graff, … Hardcover R1,685 R1,212 Discovery Miles 12 120
Mastering Microsoft Azure Infrastructure…
John Savill Paperback R1,069 R689 Discovery Miles 6 890
Terraform: Up & Running - Writing…
Yevgeniy Brikman Paperback R1,088 R804 Discovery Miles 8 040
Blockchain and the Law - The Rule of…
Primavera de Filippi, Aaron Wright Paperback R370 R334 Discovery Miles 3 340
Guide to Supporting Microsoft Private…
Ron Carswell Paperback R1,136 R948 Discovery Miles 9 480
Getting an Information Security Job For…
Peter H. Gregory Paperback  (1)
R507 R345 Discovery Miles 3 450
CompTIA Linux+ Study Guide - Exam…
Christine Bresnahan, Richard Blum Paperback R1,089 R709 Discovery Miles 7 090
The Art of Memory Forensics - Detecting…
Michael Hale Ligh, Andrew Case, … Paperback R1,233 R898 Discovery Miles 8 980
Session Initiation Protocol (SIP…
Travis Russell Hardcover R1,697 Discovery Miles 16 970
Networking All-in-One For Dummies
Doug Lowe Paperback R686 R472 Discovery Miles 4 720

 

Partners