Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking
The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. * Discover how much you already know by beginning with an assessment test * Understand all content, knowledge, and tasks covered by the CISA exam * Get more in-depths explanation and demonstrations with an all-new training video * Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.
Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost, it is about business projects as opposed to construction or engineering projects. Although many techniques, like schedule management, apply to both, they are usually applied differently. As its title conveys, the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects, up to $20 million, but often below $1 million. Some literature favors large and mega-projects, but for every mega-project, there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless, the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects. This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos.' Rather, it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea, which is stated repeatedly, is to do the essentials and to do them consistently and well. Strong emphasis is placed on things that happen before, around, and after the project itself. So, while the basic disciplines like engaging with stakeholders, managing scope, schedules, costs, risks, issues, changes, and communication, are thoroughly explained, other important aspects are covered. These include: governance of a project and of a portfolio of projects, project selection with its financial and non-financial aspects, effective use of the business case through to benefits realization, procurement, outsourcing and partnership, and also the agile mindset that is valuable beyond Agile projects. Besides project managers and sponsors, this book is intended for people who are working in business or government, at any level, or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students, although many would benefit from the contents.
Packed with hands-on learning tools, Tomsho's GUIDE TO NETWORKING ESSENTIALS, Eighth Edition, equips you with the knowledge and skills to work with network infrastructure devices and network operating systems in a small to medium-size network environment. Focusing on troubleshooting and computer networking technologies, it delivers a comprehensive introduction to network protocols and network devices, including wireless and cybersecurity technologies. It reflects the latest networking technologies and operating systems, covers new Ethernet standards, includes an Internet of Things (IoT) chapter and adds certification mapping to the Microsoft Technology Associate (MTA Exam 98-366) in Networking Fundamentals. Maximizing your success, virtual labs and the MindTap digital learning solution give you ample opportunities to put what you learn into practice and prep for the certification test.
Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West/Dean/Andrews' NETWORK+ GUIDE TO NETWORKS, 8th edition. It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, security and troubleshooting. Virtualization-based projects give you experience working with a wide variety of hardware, software, operating systems and device interactions, while "On the Job" stories, Applying Concepts activities, and Hands-On and Capstone Projects let you explore concepts in more depth. MindTap Networking offers additional practice and certification prep. The text's emphasis on real-world problem solving provides the tools for success in any computing environment.
Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough introduction that includes coverage of the language of computer networks as well as the effects of data communications on business and society. Balancing technical concepts with everyday issues, it equips you with a solid understanding of the basic features, operations, and limitations of different types of computer networks. It offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction. The Eighth Edition also offers up-to-the-minute coverage of near field communications, updated USB interface, lightning interface, and IEEE 802.11 ac and ad wireless standards, firewall updates, router security problems, the Internet of Things, cloud computing, zero-client workstations, and Internet domain names.
CCNA Interactive Learning: More than 300 labs More than 4,000 hands-on tasks Four Kinds of Labs: Skill Builders Subnetting Exercises Configuration Scenarios Troubleshooting Scenarios The CCNA 200-301 Network Simulator is a single-user software package. It helps you develop and improve hands-on configuration and troubleshooting skills without the investment in expensive lab hardware. This state-of-the-art, interactive simulation software enables you to practice your networking skills with more than 300 structured labs designed to help you learn by doing, the most effective method of learning. Experience realistic network device responses as you perform each lab, which include detailed instructions, topology diagrams, critical-thinking questions, hints, and answers. Working through the labs, you will quickly become proficient with all the common Cisco IOS version 15 router and switch commands on the CCNA exam. Unlike other simulators on the market, the lab scenarios included in the CCNA 200-301 Network Simulator are far more complex, challenging you to learn how to perform real-world network configuration and troubleshooting tasks. Master the hands-on skills needed to succeed on the CCNA exam, including: Network fundamentals Network access IP connectivity IP services Security fundamentals IP Subnetting Skill Builders: These 175+ labs are narrowly focused, enabling you to practice your configuration skills on a single topic. Coverage includes: Interface settings and status Router and Switch CLI Exec Mode and config process Telnet, Ping, Traceroute, and terminal history Switch IP address, connectivity, and forwarding PC IP commands Configuring IP addresses Subnet Zero IP addressing and IPv6 address configuration CDP and LLDP VLANs and Trunking Router-on-a-stick STP and MLS Static and Dynamic EtherChannel Wireless LAN Controllers Connected, static, and default routes OSPF SSH NAT NTP Router and switch security fundamentals ACL CHCP Dynamic ARP Port security IOS backup Subnetting Exercises: These 80 labs help you to perform subnetting calculations quickly and accurately, a critical skill for success on the CCNA exam. Topics covered include: IPv4 and IPv6 subnet ID calculation IP address rejection IP route selection VLSM overlaps IPv6 EUI-64 calculation Selecting VLSM routes Configuration Scenarios: These 40+ labs are more broadly focused, combining multiple technologies into configuration scenarios that mimic real-world environments. These labs are longer and more complex,challenging you to put your configuration skills to the test. Topics covered include: IP and MAC comparisons Switch IP connectivity and security Subnetting and addressing IP addressing and configuration IPv6 configuraiton Switch interfaces and forwarding VLAN trunking STP analysis, configuration, and prediction Wireless LAN Controllers Static routing Configuring default routes OSPF Router-on-a-stick to MLS SSH and Telnet NAT ACL Password recovery Rebuilding a configuration Troubleshooting Scenarios: These 18 labs present typical troubleshooting scenarios and require you to explore the misconfigured network, isolate the issues, and correct the problems. These are very complicated and realistic scenarios that truly test your ability to perform the job of a network engineer. Topics covered include: Switch forwarding Path analysis and troubleshooting IPv4/IPv6 addressing IP routing OSPF VLAN troubleshooting STP Network discovery Port security System requirements: Operating Systems: Windows 10 (32/64 bit) Windows 8.1 (32/64 bit) Mac OS 10.15 (Catalina) Mac OS 10.14 (Mojave) Mac OS 10.13 (High Sierra) Free Storage Space: 1 GB (minimum) System memory (RAM): 4 GB (minimum) Processor: i3 3.4 GHz (minimum) and above Software Pre-requisites: Node JS 10 PDF reader Monitor resolution: Minimum resolution: 1024 X 768 Best viewed: 1280 X 800 and above Internet speed: 2 Mbps (minimum) is needed only during software activation, reporting feedback and receiving updates. After activation, Internet is not needed for accessing the labs in the application. Language: English (US)
Learn the key objectives and most crucial concepts covered by the Security+ Exam SY0-601 with this comprehensive and practical study guide! An online test bank offers 650 practice questions and flashcards! The Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam. Accomplished authors and security experts Mike Chapple and David Seidl walk you through the fundamentals of crucial security topics, including the five domains covered by the SY0-601 Exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance The study guide comes with the Sybex online, interactive learning environment offering 650 practice questions! Includes a pre-assessment test, hundreds of review questions, practice exams, flashcards, and a glossary of key terms. The book is written in a practical and straightforward manner, ensuring you can easily learn and retain the material. Perfect for everyone planning to take the SY0-601 Exam--as well as those who hope to secure a high-level certification like the CASP+, CISSP, or CISA--the study guide also belongs on the bookshelves of everyone who has ever wondered if the field of IT security is right for them. It's a must-have reference!
ISO/IEC 27001:2005 is an international standard for information security management systems (ISMSs). Closely allied to ISO/IEC 27002:2005 (which used to be known as ISO17799), this standard (sometimes called the ISMS standard) can help organisations meet all their information-related regulatory compliance objectives and can help them prepare and position themselves for new and emerging regulations. Information is the lifeblood of today s organis-ation and, therefore, ensuring that information is simultaneously protected and available to those who need it is essential to modern business operations. Information systems are not usually designed from the outset to be secure. Technical security measures and checklists are limited in their ability to protect a complete information system. Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. ISO/IEC 27001 provides the specification for an information security management system and, in the related Code of Practice, ISO/IEC 27002, it draws on the knowledge of a group of experienced information security practitioners in a wide range of significant organisations across more than 40 countries to set out best practice in information security. An ISO27001-compliant system will provide a systematic approach to ensuring the availability, confidentiality and integrity of corporate information. The controls of ISO27001 are based on identifying and combating the entire range of potential risks to the organisation s information assets. This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Key features include: The ISO/IEC 27000 Family of Information Security Standards Background to the Standards Specification vs Code of Practice Certification process The ISMS and ISO27001 Overview of ISO/IEC 27001:2005 Documentation & Records Management Responsibility Policy & Scope Risk Assessment Implementation
Since the advent of the internet, online communities have emerged as a way for users to share their common interests and connect with others with ease. As the possibilities of the online world grew and the COVID-19 pandemic raged across the world, many organizations recognized the utility in not only providing further services online, but also in transitioning operations typically fulfilled in-person to an online space. As society approaches a reality in which most community practices have moved to online spaces, it is essential that community leaders remain knowledgeable on the best practices in cultivating engagement. Community Engagement in the Online Space evaluates key issues and practices pertaining to community engagement in remote settings. It analyzes various community engagement efforts within remote education, online groups, and remote work. This book further reviews the best practices for community engagement and considerations for the optimization of these practices for effective virtual delivery to support emergency environmental challenges, such as pandemic conditions. Covering topics such as community belonging, global health virtual practicum, and social media engagement, this premier reference source is an excellent resource for program directors, faculty and administrators of both K-12 and higher education, students of higher education, business leaders and executives, IT professionals, online community moderators, librarians, researchers, and academicians.
The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.
Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.
Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. Cyberattacks incur financial losses for organizations and can affect their reputations. Due to this, cybersecurity has become critical for business enterprises. Extensive technological adoption in businesses and the evolution of FinTech applications require reasonable cybersecurity measures to protect organizations from internal and external security threats. Recent advances in the cybersecurity domain such as zero trust architecture, application of machine learning, and quantum and post-quantum cryptography have colossal potential to secure technological infrastructures. Cybersecurity Issues and Challenges for Business and FinTech Applications discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. Covering essential topics such as artificial intelligence, social commerce, and data leakage, this reference work is ideal for cybersecurity professionals, business owners, managers, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.
Small and medium-sized enterprises (SMEs) are recognized as the backbone of today's world economy. However, SMEs are well known for having limitations and acceptance barriers in adopting new technology even though the internet and communications channel's revolution has changed the way people conduct business today. Further, the COVID-19 pandemic has disturbed the operations of SMEs and increased the burden on social media application globally. It is essential that SMEs utilize social media to strengthen their performance. Strengthening SME Performance Through Social Media Adoption and Usage explores experiences in different technological, managerial, organizational, and entrepreneurial environmental issues. It focuses on different conceptions of factors and consequences influencing social media usage and SME performance. Covering topics such as corporate social responsibility, marketing frameworks, and social media adoption, this premier reference source is a valuable resource for entrepreneurs, business leaders and managers, human resource managers, marketers, consultants, students and educators of higher education, librarians, researchers, and academicians.
Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. The Handbook of Research on Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.
This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities
Recent years have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information; the privacy of consumers; and the continuity of economic activity. Compliance is a measure of the extent to which a current state is in conformance with a desired state. The desired state is commonly operationalized through specific business objectives, professional standards, and regulations. Assurance services provide a means of evaluating the level of compliance with various cybersecurity requirements. The proposed book will summarize current cybersecurity guidance and provide a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators. This publication will provide a synopsis of current cybersecurity guidance that organizations should consider in establishing and updating their cybersecurity systems. Assurance services will also be addressed so that management and their auditors can regularly evaluate their extent of compliance. This book should be published because its theme will provide company management, practitioners, and academics with a good summary of current guidance and how to conduct assurance of appropriate compliance.
Do you feel overwhelmed by the AI wave? Worried that it could cost you your job, harm your business, or even take over? AI has pervaded our lives and is aggressively disrupting business. No person today can afford to ignore AI. Age of Agency is your companion, helping you leverage AI's capabilities to power your productivity and success. By understanding AI, you will learn to use it as a tool for personal career growth and business success. Former Microsoft executive Kerushan Govender demystifies AI, emphasising the importance of human agency. Reconnect with the needs of humanity and learn the importance of care as a differentiator in an AI world. Avoid the potential pitfalls of excessive reliance on the technology. Age of Agency is a blueprint for ensuring human agency outpaces computer agency. It boldly pits the limits of machine learning against the infinity of human ability. With this survival guide, you’ll uncover ways to connect with humanity on a deeper level, going beyond anything AI can do. Ready to become AI-savvy, with your humanity as your differentiator? Dive into the future with the confidence to ride the wave of today’s AI revolution.
Opinion Mining and Text Analytics on Literary Works and Social Media introduces the use of artificial intelligence and big data analytics techniques which can apply opinion mining and text analytics on literary works and social media. This book focuses on theories, method and approaches in which data analytic techniques can be used to analyze data from social media, literary books, novels, news, texts, and beyond to provide a meaningful pattern. The subject area of this book is multidisciplinary; related to data science, artificial intelligence, social science and humanities, and literature. This is an essential resource for scholars, Students and lecturers from various fields of data science, artificial intelligence, social science and humanities, and literature, university libraries, new agencies, and many more.
Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.
Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners.
During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and it is important to have resources that can introduce and guide users through the current best practices, laboratory methods, policies, protocols, and more within cyber public administration and social policy. The Handbook of Research on Cyber Approaches to Public Administration and Social Policy focuses on the post-pandemic changes in the functions of social policy and public administration. It also examines the implications of the cyber cosmos on public and social policies and practices from a broad perspective. Covering topics such as intersectional racism, cloud computing applications, and public policies, this major reference work is an essential resource for scientists, laboratory technicians, professionals, technologists, computer scientists, policymakers, students, educators, researchers, and academicians. |
You may like...
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R8,415
Discovery Miles 84 150
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, …
Hardcover
R2,779
Discovery Miles 27 790
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, …
Hardcover
R7,692
Discovery Miles 76 920
Research Anthology on Architectures…
Information R Management Association
Hardcover
R13,372
Discovery Miles 133 720
Research Anthology on Architectures…
Information R Management Association
Hardcover
R13,368
Discovery Miles 133 680
Research Anthology on Architectures…
Information R Management Association
Hardcover
R13,378
Discovery Miles 133 780
|