0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (340)
  • R250 - R500 (937)
  • R500+ (16,375)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

CISA - Certified Information Systems Auditor Study Guide 4e (Paperback, 4th Edition): Cannon CISA - Certified Information Systems Auditor Study Guide 4e (Paperback, 4th Edition)
Cannon
R1,653 R1,274 Discovery Miles 12 740 Save R379 (23%) Ships in 12 - 17 working days

The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. * Discover how much you already know by beginning with an assessment test * Understand all content, knowledge, and tasks covered by the CISA exam * Get more in-depths explanation and demonstrations with an all-new training video * Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.

Managing Business Projects - The Essentials (Paperback): Frank Einhorn Managing Business Projects - The Essentials (Paperback)
Frank Einhorn
R495 R468 Discovery Miles 4 680 Save R27 (5%) Ships in 9 - 14 working days

Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost, it is about business projects as opposed to construction or engineering projects. Although many techniques, like schedule management, apply to both, they are usually applied differently. As its title conveys, the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects, up to $20 million, but often below $1 million. Some literature favors large and mega-projects, but for every mega-project, there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless, the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects.

This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos.' Rather, it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea, which is stated repeatedly, is to do the essentials and to do them consistently and well.

Strong emphasis is placed on things that happen before, around, and after the project itself. So, while the basic disciplines like engaging with stakeholders, managing scope, schedules, costs, risks, issues, changes, and communication, are thoroughly explained, other important aspects are covered. These include: governance of a project and of a portfolio of projects, project selection with its financial and non-financial aspects, effective use of the business case through to benefits realization, procurement, outsourcing and partnership, and also the agile mindset that is valuable beyond Agile projects.

Besides project managers and sponsors, this book is intended for people who are working in business or government, at any level, or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students, although many would benefit from the contents.

Guide to Networking Essentials (Paperback, 8th edition): Greg Tomsho Guide to Networking Essentials (Paperback, 8th edition)
Greg Tomsho
R1,337 R1,199 Discovery Miles 11 990 Save R138 (10%) In Stock

Packed with hands-on learning tools, Tomsho's GUIDE TO NETWORKING ESSENTIALS, Eighth Edition, equips you with the knowledge and skills to work with network infrastructure devices and network operating systems in a small to medium-size network environment. Focusing on troubleshooting and computer networking technologies, it delivers a comprehensive introduction to network protocols and network devices, including wireless and cybersecurity technologies. It reflects the latest networking technologies and operating systems, covers new Ethernet standards, includes an Internet of Things (IoT) chapter and adds certification mapping to the Microsoft Technology Associate (MTA Exam 98-366) in Networking Fundamentals. Maximizing your success, virtual labs and the MindTap digital learning solution give you ample opportunities to put what you learn into practice and prep for the certification test.

Network+ Guide to Networks (Paperback, 8th edition): Jill West, Jean Andrews, Tamara Dean Network+ Guide to Networks (Paperback, 8th edition)
Jill West, Jean Andrews, Tamara Dean
R1,305 R1,172 Discovery Miles 11 720 Save R133 (10%) Ships in 10 - 15 working days

Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West/Dean/Andrews' NETWORK+ GUIDE TO NETWORKS, 8th edition. It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, security and troubleshooting. Virtualization-based projects give you experience working with a wide variety of hardware, software, operating systems and device interactions, while "On the Job" stories, Applying Concepts activities, and Hands-On and Capstone Projects let you explore concepts in more depth. MindTap Networking offers additional practice and certification prep. The text's emphasis on real-world problem solving provides the tools for success in any computing environment.

Data Communications and Computer Networks - A Business User's Approach (Hardcover, 8th edition): Curt. White Data Communications and Computer Networks - A Business User's Approach (Hardcover, 8th edition)
Curt. White
R990 R499 Discovery Miles 4 990 Save R491 (50%) In Stock

Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough introduction that includes coverage of the language of computer networks as well as the effects of data communications on business and society. Balancing technical concepts with everyday issues, it equips you with a solid understanding of the basic features, operations, and limitations of different types of computer networks. It offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction. The Eighth Edition also offers up-to-the-minute coverage of near field communications, updated USB interface, lightning interface, and IEEE 802.11 ac and ad wireless standards, firewall updates, router security problems, the Internet of Things, cloud computing, zero-client workstations, and Internet domain names.

CompTIA Security+ Study Guide - Exam SY0-601 (Paperback, 8th Edition): Mike Chapple, David Seidl CompTIA Security+ Study Guide - Exam SY0-601 (Paperback, 8th Edition)
Mike Chapple, David Seidl
R1,493 R1,199 Discovery Miles 11 990 Save R294 (20%) Ships in 10 - 15 working days

Learn the key objectives and most crucial concepts covered by the Security+ Exam SY0-601 with this comprehensive and practical study guide! An online test bank offers 650 practice questions and flashcards! The Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam. Accomplished authors and security experts Mike Chapple and David Seidl walk you through the fundamentals of crucial security topics, including the five domains covered by the SY0-601 Exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance The study guide comes with the Sybex online, interactive learning environment offering 650 practice questions! Includes a pre-assessment test, hundreds of review questions, practice exams, flashcards, and a glossary of key terms. The book is written in a practical and straightforward manner, ensuring you can easily learn and retain the material. Perfect for everyone planning to take the SY0-601 Exam--as well as those who hope to secure a high-level certification like the CASP+, CISSP, or CISA--the study guide also belongs on the bookshelves of everyone who has ever wondered if the field of IT security is right for them. It's a must-have reference!

The Gathering Cloud (Paperback): J. R. Carpenter The Gathering Cloud (Paperback)
J. R. Carpenter
R378 Discovery Miles 3 780 Ships in 12 - 17 working days
Age Of Agency - Rise With A.I. (Paperback): Kerushan Govender Age Of Agency - Rise With A.I. (Paperback)
Kerushan Govender
R350 R236 Discovery Miles 2 360 Save R114 (33%) Ships in 9 - 14 working days

Do you feel overwhelmed by the AI wave? Worried that it could cost you your job, harm your business, or even take over? AI has pervaded our lives and is aggressively disrupting business. No person today can afford to ignore AI.

Age of Agency is your companion, helping you leverage AI's capabilities to power your productivity and success. By understanding AI, you will learn to use it as a tool for personal career growth and business success.

Former Microsoft executive Kerushan Govender demystifies AI, emphasising the importance of human agency. Reconnect with the needs of humanity and learn the importance of care as a differentiator in an AI world. Avoid the potential pitfalls of excessive reliance on the technology.

Age of Agency is a blueprint for ensuring human agency outpaces computer agency. It boldly pits the limits of machine learning against the infinity of human ability. With this survival guide, you’ll uncover ways to connect with humanity on a deeper level, going beyond anything AI can do.

Ready to become AI-savvy, with your humanity as your differentiator? Dive into the future with the confidence to ride the wave of today’s AI revolution.

Networking All-in-One For Dummies, 8th Edition (Paperback, 8th Edition): D. Lowe Networking All-in-One For Dummies, 8th Edition (Paperback, 8th Edition)
D. Lowe
R896 Discovery Miles 8 960 Ships in 12 - 17 working days

Your ultimate one-stop networking reference Designed to replace that groaning shelf-load of dull networking books you'd otherwise have to buy and house, Networking All-in-One For Dummies covers all the basic and not-so-basic information you need to get a network up and running. It also helps you keep it running as it grows more complicated, develops bugs, and encounters all the fun sorts of trouble you expect from a complex system. Ideal both as a starter for newbie administrators and as a handy quick reference for pros, this book is built for speed, allowing you to get past all the basics--like installing and configuring hardware and software, planning your network design, and managing cloud services--so you can get on with what your network is actually intended to do. In a friendly, jargon-free style, Doug Lowe--an experienced IT Director and prolific tech author--covers the essential, up-to-date information for networking in systems such as Linux and Windows 10 and clues you in on best practices for security, mobile, and more. Each of the nine minibooks demystifies the basics of one key area of network management. Plan and administrate your network Implement virtualization Get your head around networking in the Cloud Lock down your security protocols The best thing about this book? You don't have to read it all at once to get things done; once you've solved the specific issue at hand, you can put it down again and get on with your life. And the next time you need it, it'll have you covered.

AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback): Santana AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback)
Santana
R1,115 Discovery Miles 11 150 Ships in 12 - 17 working days

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics. Covers all AWS Certified Security Specialty exam topics Explains AWS cybersecurity techniques and incident response Covers logging and monitoring using the Amazon cloud Examines infrastructure security Describes access management and data protection With a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover): Omar Santos Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover)
Omar Santos
R1,368 Discovery Miles 13 680 Ships in 10 - 15 working days

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide presents you with an organised test-preparation routine using proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Master Cisco CyberOps Associate CBROPS 200-201 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions in the practice test software Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Leading Cisco technology expert Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A video mentoring lesson from the authors Complete Video Course A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organise and optimise your study time

Linux Command Line and Shell Scripting Bible, Fourth Edition (Paperback, 4th Edition): R. Blum Linux Command Line and Shell Scripting Bible, Fourth Edition (Paperback, 4th Edition)
R. Blum
R962 Discovery Miles 9 620 Ships in 12 - 17 working days

Advance your understanding of the Linux command line with this invaluable resource Linux Command Line and Shell Scripting Bible, 4th Edition is the newest installment in the indispensable series known to Linux developers all over the world. Packed with concrete strategies and practical tips, the latest edition includes brand-new content covering: Understanding the Shell Writing Simple Script Utilities Producing Database, Web & Email Scripts Creating Fun Little Shell Scripts Written by accomplished Linux professionals Christine Bresnahan and Richard Blum, Linux Command Line and Shell Scripting Bible, 4th Edition teaches readers the fundamentals and advanced topics necessary for a comprehensive understanding of shell scripting in Linux. The book is filled with real-world examples and usable scripts, helping readers navigate the challenging Linux environment with ease and convenience. The book is perfect for anyone who uses Linux at home or in the office and will quickly find a place on every Linux enthusiast's bookshelf.

CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Paperback): Ric Messier CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Paperback)
Ric Messier
R1,327 Discovery Miles 13 270 Ships in 12 - 17 working days

The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you’ll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide. The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You’ll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.

Hacking For Dummies, 7th Edition (Paperback, 7th Edition): K Beaver Hacking For Dummies, 7th Edition (Paperback, 7th Edition)
K Beaver
R544 Discovery Miles 5 440 Ships in 12 - 17 working days

Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to "penetration test" your network's security Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.

8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback): K Crawley 8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback)
K Crawley
R524 Discovery Miles 5 240 Ships in 12 - 17 working days

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback): Jenny Phillips, Alan... BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback)
Jenny Phillips, Alan Jarvis, Mark Fishpool, Richard McGill, Tim Cook, …
R1,036 Discovery Miles 10 360 Ships in 12 - 17 working days

Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise (Paperback): J Minella Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise (Paperback)
J Minella
R896 Discovery Miles 8 960 Ships in 12 - 17 working days

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security. Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage--including data published for the first time--of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies Effective technical resources and real-world sample architectures Explorations of the relationships between security, wireless, and network elements Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.

Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services... Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services (Paperback)
P Abdoulaye
R715 Discovery Miles 7 150 Ships in 12 - 17 working days

Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.

Energy Efficient Spectrum Resources Usage in WPANs - IEEE 82.15.4 MAC Sub-layer Protocols (Hardcover): Luis Miguel Borges,... Energy Efficient Spectrum Resources Usage in WPANs - IEEE 82.15.4 MAC Sub-layer Protocols (Hardcover)
Luis Miguel Borges, Norberto Barroca, Periklis Chatzimisios, Fernando Jose Velez
R2,892 Discovery Miles 28 920 Ships in 12 - 17 working days

Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.

Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition): R. Anderson Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition)
R. Anderson
R1,333 Discovery Miles 13 330 Ships in 12 - 17 working days

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability - why companies build vulnerable systems and governments look the other way How dozens of industries went online - well or badly How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?

Enterprise Level Security 1 & 2 (Paperback): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Paperback)
Kevin Foltz, William R. Simpson
R1,394 Discovery Miles 13 940 Ships in 12 - 17 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Cloud Security For Dummies, 1st Edition (Paperback): T. Coombs Cloud Security For Dummies, 1st Edition (Paperback)
T. Coombs
R629 Discovery Miles 6 290 Ships in 12 - 17 working days

Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. This book offers step-by-step demonstrations of how to: Establish effective security protocols for your cloud application, network, and infrastructure Manage and use the security tools provided by different cloud vendors Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book.

Threat Hunting in the Cloud - Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks (Paperback): C Peiris Threat Hunting in the Cloud - Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks (Paperback)
C Peiris
R879 Discovery Miles 8 790 Ships in 12 - 17 working days

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.

What Is Cybersecurity For? (Paperback): Tim Stevens What Is Cybersecurity For? (Paperback)
Tim Stevens
R266 Discovery Miles 2 660 Ships in 12 - 17 working days

How will protecting our digital infrastructure shape our future? Cybersecurity is one of the key practical and political challenges of our time. It is at the heart of how modern societies survive and thrive, yet public understanding is still rudimentary: media portrayals of hoodie-wearing hackers accessing the Pentagon don't convey its complexity or significance to contemporary life. This book addresses this gap, showing that the political dimension is as important as the technological one. It accessibly explains the complexities of global information systems, the challenges of providing security to users, societies, states and the international system, and the multitude of competing players and ambitions in this arena. Making the case for understanding it not only as a technical project, but as a crucial political one that links competing visions of what cybersecurity is for, it tackles the ultimate question: how can we do it better?

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback)
James Aweya
R3,625 Discovery Miles 36 250 Ships in 12 - 17 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Designing Switch/Routers - Fundamental…
James Aweya Hardcover R8,620 Discovery Miles 86 200
Securing Remote Access in Palo Alto…
Tom Piens Paperback R1,273 Discovery Miles 12 730
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,322 Discovery Miles 13 220
Privacy and Legal Issues in Cloud…
Anne S.Y. Cheung, Rolf H. Weber Paperback R1,357 Discovery Miles 13 570
How I Rob Banks - And Other Such Places
F. C. Barker Hardcover R580 R412 Discovery Miles 4 120
Data Visualization with Excel Dashboards…
D Kusleika Paperback R755 Discovery Miles 7 550
Principles of Information Security
Herbert Mattord, Michael Whitman Paperback R1,274 R1,145 Discovery Miles 11 450
The Pentester BluePrint - Starting a…
PL Wylie Paperback R555 Discovery Miles 5 550
CompTIA A+ Complete Study Guide: Core 1…
Q Docter Paperback R1,197 Discovery Miles 11 970

 

Partners