0
Your cart

Your cart is empty

Browse All departments
Price
  • R50 - R100 (3)
  • R100 - R250 (1,550)
  • R250 - R500 (1,056)
  • R500+ (13,275)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

CISA Certified Information Systems Auditor Study Guide (Paperback, 4th Edition): David L Cannon, Brian T. O'Hara, Allen... CISA Certified Information Systems Auditor Study Guide (Paperback, 4th Edition)
David L Cannon, Brian T. O'Hara, Allen Keele
R1,521 R995 Discovery Miles 9 950 Save R526 (35%) Ships in 10 - 15 working days

The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. * Discover how much you already know by beginning with an assessment test * Understand all content, knowledge, and tasks covered by the CISA exam * Get more in-depths explanation and demonstrations with an all-new training video * Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.

Tools And Weapons - The Promise And The Peril Of The Digital Age (Paperback): Brad Smith, Carol Ann Browne Tools And Weapons - The Promise And The Peril Of The Digital Age (Paperback)
Brad Smith, Carol Ann Browne; Foreword by Bill Gates 1
R355 R284 Discovery Miles 2 840 Save R71 (20%) Ships in 5 - 10 working days

*THE INSTANT NEW YORK TIMES BESTSELLER AND WORLD ECONOMIC FORUM BOOK CLUB PICK*

'A clear, compelling guide to some of the most pressing debates in technology today.' Bill Gates, from the foreword

'The de facto ambassador for the technology industry at large.' The New York Times

'One of the few executives willing to speak openly about the industry's most vexing issues.' Sunday Times

Microsoft President Brad Smith operates by a simple core belief: when your technology changes the world, you bear a responsibility to help address the world you have helped create.

This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation.

In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no pre-existing playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.

From Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitization of everything accelerates.

In Tools and Weapons, Brad Smith takes us behind the scenes on some of the biggest stories to hit the tech industry in the past decade and some of the biggest threats we face. From Edward Snowden's NSA leak to the NHS WannaCry ransomware attack, this book is essential reading to understand what's happening in the world around us.

If you watched Inside Bill's Brain: Decoding Bill Gates on Netflix, you will find Tools and Weapons equally fascinating.

'This is a colourful and insightful insiders' view of how technology is both empowering us and threatening us. From privacy to cyberattacks, this timely book is a useful guide for how to navigate the digital future.' Walter Isaacson, bestselling author of Steve Jobs

Network+ Guide to Networks (Paperback, 7th edition): Tamara Dean, Jean Andrews, Jill West Network+ Guide to Networks (Paperback, 7th edition)
Tamara Dean, Jean Andrews, Jill West
R671 Discovery Miles 6 710 In stock

Master the technical skills and industry know-how to begin an exciting career installing, configuring, and troubleshooting computer networks with the completely updated NETWORK+ GUIDE TO NETWORKS, 7E. You can prepare for success on CompTIA's Network+ N10-006 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, and troubleshooting. This edition addresses today's latest technology with new features that make essential information easily accessible and help you visualize high-level concepts. New OSI layer icons visually link concepts and the OSI model. New and updated "On the Job" stories, Applying Concepts activities, Hands-On and Case Projects let you explore concepts in more depth. The NETWORK+ GUIDE TO NETWORKS, 7E's emphasis on real-world problem solving provides the tools you need to succeed in any computing environment.

Guide to Network Defense and Countermeasures (Paperback, 3rd edition): Randy Weaver, Dean Farwood, Dawn Weaver Guide to Network Defense and Countermeasures (Paperback, 3rd edition)
Randy Weaver, Dean Farwood, Dawn Weaver
R1,237 R1,045 Discovery Miles 10 450 Save R192 (16%) Ships in 15 - 25 working days

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional.

Network+ Guide to Networks (Paperback, 8th edition): Jill West, Tamara Dean, Jean Andrews Network+ Guide to Networks (Paperback, 8th edition)
Jill West, Tamara Dean, Jean Andrews
R1,016 R870 Discovery Miles 8 700 Save R146 (14%) Ships in 15 - 25 working days

Master the technical skills and industry knowledge you need to begin an exciting career installing, configuring and troubleshooting computer networks with West/Dean/Andrews' NETWORK+ GUIDE TO NETWORKS, 8th edition. It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all objectives, including protocols, topologies, hardware, network design, security and troubleshooting. Virtualization-based projects give you experience working with a wide variety of hardware, software, operating systems and device interactions, while "On the Job" stories, Applying Concepts activities, and Hands-On and Capstone Projects let you explore concepts in more depth. MindTap Networking offers additional practice and certification prep. The text's emphasis on real-world problem solving provides the tools for success in any computing environment.

Business Data Networks and Security, Global Edition (Paperback, 10th edition): Julia Panko, Raymond R. Panko Business Data Networks and Security, Global Edition (Paperback, 10th edition)
Julia Panko, Raymond R. Panko
R1,694 Discovery Miles 16 940 Ships in 10 - 15 working days

For undergraduate and graduate courses in Business Data Communication / Networking (MIS) Clear writing style, job-ready detail, and focus on the technologies used in today's marketplace Business Data Networks and Security guides readers through the details of networking, while helping them train for the workplace. It starts with the basics of security and network design and management; goes beyond the basic topology and switch operation covering topics like VLANs, link aggregation, switch purchasing considerations, and more; and covers the latest in networking techniques, wireless networking, with an emphasis on security. With this text as a guide, readers learn the basic, introductory topics as a firm foundation; get sound training for the marketplace; see the latest advances in wireless networking; and learn the importance and ins and outs of security. Teaching and Learning Experience This textbook will provide a better teaching and learning experience-for you and your students. Here's how: The basic, introductory topics provide a firm foundation. Job-level content prepares students with the skills demanded by today's employers. The latest in networking techniques and wireless networking, including a focus on security, keeps students up to date and aware of what's going on in the field. The flow of the text guides students through the material. MyMISLab not included. Students, if MyMISLab is a recommended/mandatory component of the course, please ask your instructor for the correct ISBN and course ID. MyMISLab is not a self-paced technology and should only be purchased when required by an instructor. Instructors, contact your Pearson representative for more information. MyMISLab is an online homework, tutorial, and assessment product designed to personalize learning and improve results. With a wide range of interactive, engaging, and assignable activities, students are encouraged to actively learn and retain tough course concepts.

Corporate Computer Security, Global Edition (Paperback, 4th edition): Randall J. Boyle, Raymond R. Panko Corporate Computer Security, Global Edition (Paperback, 4th edition)
Randall J. Boyle, Raymond R. Panko
R1,672 Discovery Miles 16 720 Ships in 10 - 15 working days

For introductory courses in IT Security. A strong business focus through a solid technical presentation of security tools. Corporate Computer Security provides a strong business focus along with a solid technical understanding of security tools. This text gives students the IT security skills they need for the workplace. This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies. This program will provide a better teaching and learning experience-for you and your students. Here's how: *Encourage Student's to Apply Concepts: Each chapter now contains new hands-on projects that use contemporary software. *Business Environment Focus: This edition includes more of a focus on the business applications of the concepts. Emphasis has been placed on securing corporate information systems, rather than just hosts in general. *Keep Your Course Current and Relevant: New examples, exercises, and research findings appear throughout the text.

Wireless Communications & Networks: Pearson New International Edition (Paperback, 2nd edition): William Stallings Wireless Communications & Networks: Pearson New International Edition (Paperback, 2nd edition)
William Stallings
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

For courses in wireless networking, wireless communications, wireless data communications or wireless technology in departments of Computer Science, Engineering, IT, and Continuing Education. The rapid growth of mobile telephone use, satellite services, and the wireless Internet are generating tremendous changes in telecommunications and networking. Combining very current technical depth with a strong pedagogy and advanced Web support, this new edition provides a comprehensive guide to wireless technology-exploring key topics such as technology and architecture, network types, design approaches, and the latest applications. Visit Stallings Companion Website at http: //williamstallings.com/CompSec/CompSec1e.html for student and instructor resources and his Computer Science Student Resource site http: //williamstallings.com/StudentSupport.html Password protected instructor resources can be accessed here by clicking on the Resources Tab to view downloadable files. (Registration required) They include Power Point Slides, Solutions, tables and figure

BTEC Level 3 National IT Student Book 1 (Paperback, 3rd edition): Karen Anderson, Alan Jarvis, Allen Kaye BTEC Level 3 National IT Student Book 1 (Paperback, 3rd edition)
Karen Anderson, Alan Jarvis, Allen Kaye; Edited by Jenny Phillips; Andrew Smith, … 1
R918 Discovery Miles 9 180 Ships in 10 - 15 working days

Resources designed to support learners of the 2010 BTEC Level 3 National IT specification*. Extensive unit coverage: Student Book 1 covers 14 units including all the mandatory units, giving learners the breadth to tailor the course to their needs and interests, when combined with Student Book 2. Functional Skills and Personal Learning and Thinking Skills are embedded in activities throughout the book. WorkSpace case studies take learners into the real world of work, showing them how they can apply their knowledge in a real-life context.

Network Flows: Pearson New International Edition - Theory, Algorithms, and Applications (Paperback, Pearson New International... Network Flows: Pearson New International Edition - Theory, Algorithms, and Applications (Paperback, Pearson New International Edition)
Ravindra K. Ahuja, Thomas L. Magnanti, James B. Orlin
R1,627 Discovery Miles 16 270 Ships in 10 - 15 working days

A comprehensive introduction to network flows that brings together the classic and the contemporary aspects of the field, and provides an integrative view of theory, algorithms, and applications.

Practical Cryptology and Web Security (Paperback): P.K. Yuen Practical Cryptology and Web Security (Paperback)
P.K. Yuen
R2,177 R1,445 Discovery Miles 14 450 Save R732 (34%) Ships in 10 - 15 working days

The transfer of information over the world wide web depends critically on secure communications. The need to protect the material we send and receive from cyberspace, from the largest of business transactions to the simplest of personal web-pages, is crucial in ensuring we can continue to use this incredible resource safely. Cryptology provides the most reliable tools for storing or transmitting digital information and is the gold standard for attaining the levels of security our online interactions demand. Taking a step-by-step approach, P. K. Yuen demonstrates how to master web-based security skills including: protecting websites from hackers and viruses; encrypting email; building a secure web-database; performing secure business transactions over the web. Working from a problem-solving perspective, he shows how to implement security solutions and looks from the attacker's point of view at possible challenges to that security. In short, Practical Cryptology and Web Security offers a practical and comprehensive guide to all aspects of web security. This book features over 120 worked examples, many from industry, demonstrate the key considerations in implementing web security. AES, this book examines the latest web technologies in terms of security, including XML Signatures and XML Digital Contracts. PK Yuen is a well known expert on Communications, Internet and the World Wide Web. He has over 13 years' experience working on web technologies including large scale application developments, engineer training and project leadership and working on the security system of the Shanghai Pu Dong airport, China. He also co-authored Practical Web Technologies, published by Addison-Wesley in 2003.

Dark Mirror - Edward Snowden and the American Surveillance State (Hardcover): Barton Gellman Dark Mirror - Edward Snowden and the American Surveillance State (Hardcover)
Barton Gellman
R708 R559 Discovery Miles 5 590 Save R149 (21%) Ships in 7 - 11 working days
Cisco Networking All-in-One For Dummies (Paperback, New): Edward Tetz Cisco Networking All-in-One For Dummies (Paperback, New)
Edward Tetz
R817 R571 Discovery Miles 5 710 Save R246 (30%) In stock

A helpful guide on all things Cisco

Do you wish that the complex topics of routers, switches, and networking could be presented in a simple, understandable presentation? With "Cisco Networking All-in-One For Dummies," they are! This expansive reference is packed with all the information you need to learn to use Cisco routers and switches to develop and manage secure Cisco networks. This straightforward-by-fun guide offers expansive coverage of Cisco and breaks down intricate subjects such as networking, virtualization, and database technologies into easily digestible pieces. Drills down complex subjects concerning Cisco networking into easy-to-understand, straightforward coverageShares best practices for utilizing Cisco switches and routers to implement, secure, and optimize Cisco networksReviews Cisco networking solutions and products, securing Cisco networks, and optimizing Cisco networksDetails how to design and implement Cisco networks

Whether you're new to Cisco networking products and services or an experienced professional looking to refresh your knowledge about Cisco, this "For Dummies" guide provides you with the coverage, solutions, and best practices you need.

How to Start Cloud Computing (Paperback): Jim Gatenby How to Start Cloud Computing (Paperback)
Jim Gatenby 1
R285 R234 Discovery Miles 2 340 Save R51 (18%) Ships in 10 - 15 working days
Wtf Is My Password - Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, Logbook to... Wtf Is My Password - Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, Logbook to Protect Usernames and Passwords, Password Notebook, Password Book Small 6 X 9 (Paperback)
Booki Nova
R132 Discovery Miles 1 320 Ships in 7 - 11 working days
Implementing Service Level Objectives - A Practical Guide to SLIs, SLOs, and Error Budgets (Paperback): Alex Hidalgo Implementing Service Level Objectives - A Practical Guide to SLIs, SLOs, and Error Budgets (Paperback)
Alex Hidalgo
R1,314 R1,000 Discovery Miles 10 000 Save R314 (24%) Ships in 10 - 15 working days

Although service-level objectives (SLOs) continue to grow in importance, there's a distinct lack of information about how to implement them. Practical advice that does exist usually assumes that your team already has the infrastructure, tooling, and culture in place. In this book, recognized SLO expert Alex Hidalgo explains how to build an SLO culture from the ground up. Ideal as a primer and daily reference for anyone creating both the culture and tooling necessary for SLO-based approaches to reliability, this guide provides detailed analysis of advanced SLO and service-level indicator (SLI) techniques. Armed with mathematical models and statistical knowledge to help you get the most out of an SLO-based approach, you'll learn how to build systems capable of measuring meaningful SLIs with buy-in across all departments of your organization. Define SLIs that meaningfully measure the reliability of a service from a user's perspective Choose appropriate SLO targets, including how to perform statistical and probabilistic analysis Use error budgets to help your team have better discussions and make better data-driven decisions Build supportive tooling and resources required for an SLO-based approach Use SLO data to present meaningful reports to leadership and your users

Hacking Exposed Computer Forensics (Hardcover, 2nd ed.): Aaron Philipp Hacking Exposed Computer Forensics (Hardcover, 2nd ed.)
Aaron Philipp
R1,832 R1,383 Discovery Miles 13 830 Save R449 (25%) Ships in 7 - 11 working days
The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws (Paperback, 2nd Edition): Dafydd Stuttard,... The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws (Paperback, 2nd Edition)
Dafydd Stuttard, Marcus Pinto
R1,245 R751 Discovery Miles 7 510 Save R494 (40%) Ships in 10 - 15 working days

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. * Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition * Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more * Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

Linux Administration: A Beginners Guide, Sixth Edition (Paperback, 6th edition): Wale Soyinka Linux Administration: A Beginners Guide, Sixth Edition (Paperback, 6th edition)
Wale Soyinka
R1,092 R852 Discovery Miles 8 520 Save R240 (22%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Essential Linux Management Skills Made EasyEffectively deploy and maintain Linux and other Free and Open Source Software (FOSS) on your servers or entire network using this practical resource. Linux Administration: A Beginner's Guide, Sixth Edition provides up-to-date details on the latest Linux distributions, including Fedora, Red Hat Enterprise Linux, CentOS, Debian, and Ubuntu. Learn how to install and customize Linux, work from the GUI or command line, configure Internet and intranet services, interoperate with Windows systems, and create reliable backups. Performance tuning, security, and virtualization are also covered and real-world examples help you put the techniques presented into practice. Install and configure popular Linux distributions, including the latest versions of Fedora, CentOS, openSUSE, Debian, and Ubuntu Administer Linux servers from the GUI or from the command line (shell) Manage users, permissions, folders, and native FOSS applications Compile, tune, upgrade, and customize the latest Linux kernel 3.x series Work with proc, SysFS, and cgroup file systems Understand and manage the Linux TCP/IP networking stack and services for both IPv4 and IPv6 Build robust firewalls, and routers using Netfilter and Linux Create and maintain print, e-mail, FTP, and web servers Use LDAP or NIS for identity management Set up and administer DNS, POP3, IMAP3, and DHCP servers Use GlusterFS, NFS, and Samba for sharing and distributing file system resources Explore and implement Linux virtualization technologies using KVM

Complex Networks - Principles, Methods and Applications (Hardcover): Vito Latora, Vincenzo Nicosia, Giovanni Russo Complex Networks - Principles, Methods and Applications (Hardcover)
Vito Latora, Vincenzo Nicosia, Giovanni Russo
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

Networks constitute the backbone of complex systems, from the human brain to computer communications, transport infrastructures to online social systems and metabolic reactions to financial markets. Characterising their structure improves our understanding of the physical, biological, economic and social phenomena that shape our world. Rigorous and thorough, this textbook presents a detailed overview of the new theory and methods of network science. Covering algorithms for graph exploration, node ranking and network generation, among others, the book allows students to experiment with network models and real-world data sets, providing them with a deep understanding of the basics of network theory and its practical applications. Systems of growing complexity are examined in detail, challenging students to increase their level of skill. An engaging presentation of the important principles of network science makes this the perfect reference for researchers and undergraduate and graduate students in physics, mathematics, engineering, biology, neuroscience and the social sciences.

Business Data Communications and Networking (Paperback, 13th Edition, EMEA Edition): Jerry FitzGerald, Alan Dennis, Alexandra... Business Data Communications and Networking (Paperback, 13th Edition, EMEA Edition)
Jerry FitzGerald, Alan Dennis, Alexandra Durcikova
R1,330 R1,220 Discovery Miles 12 200 Save R110 (8%) Ships in 10 - 15 working days
Oracle Exalogic Elastic Cloud Handbook (Paperback, Ed): Tom Plunkett, Tj Palazzolo, Tejas Joshi Oracle Exalogic Elastic Cloud Handbook (Paperback, Ed)
Tom Plunkett, Tj Palazzolo, Tejas Joshi
R1,254 R953 Discovery Miles 9 530 Save R301 (24%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Achieve Extreme Application Performance for a Private Cloud with Oracle Exalogic Elastic Cloud Transition to a private cloud computing infrastructure and achieve unmatched levels of performance with help from this Oracle Press guide. Oracle Exalogic Elastic Cloud Handbook shows you how to plan, implement, and maintain a private cloud. Find out how to set up components, deploy Java applications, maximize redundancy and throughput, and migrate legacy workloads. Examples, screenshots, and diagrams are included throughout this comprehensive resource. Configure Oracle Exalogic Elastic Cloud nodes and racks Optimize Java EE application performance on Oracle WebLogic Server Provision and administer a highly scalable private cloud Build, debug, and manage custom Java applications Secure, monitor, and tune using Oracle Enterprise Manager Leverage capabilities from Oracle Fusion Middleware Consolidate Oracle and third-party application workloads

Designing the Internet of Things (Paperback): Adrian McEwen, Hakim Cassimally Designing the Internet of Things (Paperback)
Adrian McEwen, Hakim Cassimally
R653 R401 Discovery Miles 4 010 Save R252 (39%) Ships in 10 - 15 working days

Take your idea from concept to production with this unique guide

Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to channel your inner Steve Jobs and successfully combine hardware, embedded software, web services, electronics, and cool design to create cutting-edge devices that are fun, interactive, and practical. If you'd like to create the next must-have product, this unique book is the perfect place to start.

Both a creative and practical primer, it explores the platforms you can use to develop hardware or software, discusses design concepts that will make your products eye-catching and appealing, and shows you ways to scale up from a single prototype to mass production.Helps software engineers, web designers, product designers, and electronics engineers start designing products using the Internet-of-Things approach Explains how to combine sensors, servos, robotics, Arduino chips, and more with various networks or the Internet, to create interactive, cutting-edge devices Provides an overview of the necessary steps to take your idea from concept through production

If you'd like to design for the future, "Designing the Internet of Things" is a great place to start.

Drag & Drop e-mail (Paperback): Davinder Singh Minhas Drag & Drop e-mail (Paperback)
Davinder Singh Minhas
R141 R118 Discovery Miles 1 180 Save R23 (16%) Ships in 10 - 15 working days

The "Drag and Drop Series" is a series of 12 books, mainly aimed at beginners and students. It is based on the WYSIWYG (What You See is What You Get) method, so the reader can easily correlated what is written in the book with what is displayed of dragging, dropping and clicking on the command with the mouse. Each book in the series focuses on a particular software and explains it in a clear and concise manner.

Intelligence-Driven Incident Response (Paperback): Scott Roberts, Rebekah Brown Intelligence-Driven Incident Response (Paperback)
Scott Roberts, Rebekah Brown
R1,482 R853 Discovery Miles 8 530 Save R629 (42%) Ships in 10 - 15 working days

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process. Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship. In three parts, this in-depth book includes: The fundamentals: get an introduction to cyber threat intelligence, the intelligence process, the incident-response process, and how they all work together Practical application: walk through the intelligence-driven incident response (IDIR) process using the F3EAD process-Find, Fix Finish, Exploit, Analyze, and Disseminate The way forward: explore big-picture aspects of IDIR that go beyond individual incident-response investigations, including intelligence team building

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Password Book - Logbook to keep track of…
Imaginary Planet Publishing Paperback R180 Discovery Miles 1 800
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R142 Discovery Miles 1 420
(ISC)2 CISSP Certified Information…
Mike Chapple, James Michael. Stewart, … Paperback R1,589 R1,063 Discovery Miles 10 630
Social Engineering - The Science of…
Christopher Hadnagy Paperback R844 R507 Discovery Miles 5 070
Wireless Physical Layer Network Coding
Jan Sykora, Alister Burr Hardcover R1,910 R1,804 Discovery Miles 18 040
Foundations of MIMO Communication
Robert W. Heath Jr, Angel Lozano Hardcover R2,117 R2,000 Discovery Miles 20 000
As Per My Previous Email ... - Decode…
Steve Burdett Paperback  (1)
R165 R132 Discovery Miles 1 320
Codes, Cryptology and Curves with…
Ruud Pellikaan, Xin-Wen Wu, … Paperback R1,321 Discovery Miles 13 210
Adversarial Machine Learning
Anthony D. Joseph, Blaine Nelson, … Hardcover R2,001 R1,684 Discovery Miles 16 840
Official Google Cloud Certified…
Dan Sullivan Paperback R1,072 R723 Discovery Miles 7 230

 

Partners