0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (289)
  • R250 - R500 (920)
  • R500+ (13,753)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

CISA - Certified Information Systems Auditor Study Guide 4e (Paperback, 4th Edition): Cannon CISA - Certified Information Systems Auditor Study Guide 4e (Paperback, 4th Edition)
Cannon
R1,554 R1,246 Discovery Miles 12 460 Save R308 (20%) Ships in 10 - 15 working days

The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. * Discover how much you already know by beginning with an assessment test * Understand all content, knowledge, and tasks covered by the CISA exam * Get more in-depths explanation and demonstrations with an all-new training video * Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.

CompTIA Security+ Guide To Network Security Fundamentals (Paperback, 8th Edition): Mark Ciampa CompTIA Security+ Guide To Network Security Fundamentals (Paperback, 8th Edition)
Mark Ciampa
R1,335 R1,242 Discovery Miles 12 420 Save R93 (7%) Ships in 10 - 15 working days

Mapped to the new CompTIA Security+ SY0-701 Certification Exam, Ciampa's COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 8th Edition, thoroughly prepares readers for professional certification and career success.

The text covers general security concepts, threats, vulnerabilities and mitigations, security architecture, security operations and security program management and oversight. It also includes expansive coverage of attack vectors and attack surfaces, social engineering attacks, data controls, endpoint vulnerabilities and defenses, identity and access management, infrastructure and wireless security, cloud and virtualization security, artificial intelligence and vulnerability management.

New Hands-On Projects, case activities and virtual online cybersecurity lab exercises help readers put what they learn into practice.

Managing Business Projects - The Essentials (Paperback, 3rd Edition): Frank Einhorn Managing Business Projects - The Essentials (Paperback, 3rd Edition)
Frank Einhorn
R1,370 R1,283 Discovery Miles 12 830 Save R87 (6%) Ships in 5 - 10 working days

Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost, it is about business projects as opposed to construction or engineering projects. Although many techniques, like schedule management, apply to both, they are usually applied differently. As its title conveys, the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects, up to $20 million, but often below $1 million. Some literature favors large and mega-projects, but for every mega-project, there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless, the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects.

This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos.' Rather, it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea, which is stated repeatedly, is to do the essentials and to do them consistently and well.

Strong emphasis is placed on things that happen before, around, and after the project itself. So, while the basic disciplines like engaging with stakeholders, managing scope, schedules, costs, risks, issues, changes, and communication, are thoroughly explained, other important aspects are covered. These include: governance of a project and of a portfolio of projects, project selection with its financial and non-financial aspects, effective use of the business case through to benefits realization, procurement, outsourcing and partnership, and also the agile mindset that is valuable beyond Agile projects.

Besides project managers and sponsors, this book is intended for people who are working in business or government, at any level, or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students, although many would benefit from the contents.

Guide to Networking Essentials (Paperback, 8th edition): Greg Tomsho Guide to Networking Essentials (Paperback, 8th edition)
Greg Tomsho
R1,365 R1,269 Discovery Miles 12 690 Save R96 (7%) Ships in 10 - 15 working days

Packed with hands-on learning tools, Tomsho's GUIDE TO NETWORKING ESSENTIALS, Eighth Edition, equips you with the knowledge and skills to work with network infrastructure devices and network operating systems in a small to medium-size network environment. Focusing on troubleshooting and computer networking technologies, it delivers a comprehensive introduction to network protocols and network devices, including wireless and cybersecurity technologies. It reflects the latest networking technologies and operating systems, covers new Ethernet standards, includes an Internet of Things (IoT) chapter and adds certification mapping to the Microsoft Technology Associate (MTA Exam 98-366) in Networking Fundamentals. Maximizing your success, virtual labs and the MindTap digital learning solution give you ample opportunities to put what you learn into practice and prep for the certification test.

Safety of Web Applications - Risks, Encryption and Handling Vulnerabilities with PHP (Hardcover): Eric Quinton Safety of Web Applications - Risks, Encryption and Handling Vulnerabilities with PHP (Hardcover)
Eric Quinton
R2,330 Discovery Miles 23 300 Ships in 10 - 15 working days

Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common attacks, and identification and rights allocation.

Distributed Systems - Concurrency and Consistency (Hardcover): Matthieu Perrin Distributed Systems - Concurrency and Consistency (Hardcover)
Matthieu Perrin
R1,821 Discovery Miles 18 210 Ships in 10 - 15 working days

Distributed Systems: Concurrency and Consistency explores the gray area of distributed systems and draws a map of weak consistency criteria, identifying several families and demonstrating how these may be implemented into a programming language. Unlike their sequential counterparts, distributed systems are much more difficult to design, and are therefore prone to problems. On a large scale, usability reminiscent of sequential consistency, which would provide the same global view to all users, is very expensive or impossible to achieve. This book investigates the best ways to specify the objects that are still possible to implement in these systems.

Optimization of Manufacturing Systems Using the Internet of Things (Paperback): Yingfeng Zhang, Fei Tao Optimization of Manufacturing Systems Using the Internet of Things (Paperback)
Yingfeng Zhang, Fei Tao
R3,249 R2,814 Discovery Miles 28 140 Save R435 (13%) Ships in 10 - 15 working days

Optimization of Manufacturing Systems Using the Internet of Things extends the IoT (Internet of Things) into the manufacturing field to develop an IoMT (Internet of Manufacturing Things) architecture with real-time traceability, visibility, and interoperability in production planning, execution, and control. This book is essential reading for anyone interested in the optimization and control of an intelligent manufacturing system. As modern manufacturing shop-floors can create bottlenecks in the capturing and collection of real-time field information, and because paper-based manual systems are time-consuming and prone to errors, this book helps readers understand how to alleviate these issues, assisting them in their decision-making on shop-floors.

RIoT Control - Understanding and Managing Risks and the Internet of Things (Paperback, UK ed.): Tyson Macaulay RIoT Control - Understanding and Managing Risks and the Internet of Things (Paperback, UK ed.)
Tyson Macaulay
R1,374 R1,161 Discovery Miles 11 610 Save R213 (16%) Ships in 10 - 15 working days

In RIOT Control, security experts from McAfee discuss how the Internet of Things (IoT) flips the current internet with de-centralized, uncontrolled elements driving massive data from the ends into central servers and the cloud, rather than the other way around. Some estimates suggest that every human being will soon be surrounded by 1,000 to 5,000 connected objects eventually, 100 trillion static or moving objects which makes for a complex system, prone to unexpected behaviors. As various industry domains rush to adopt IoT technologies, they need guidance on IoT-ready security and risk management practices to ensure system availability and security.

This book explains IoT risk in terms of project requirements, business needs, and system designs that include endpoints, network connectivity, and cloud-based data centers. Understand the threats and vulnerabilities of the IoT, as well as performance metrics at the enterprise level. In recommending emerging techniques, the authors provide insight to help judge which are best according to specific risks and organizational needs under consideration. Multiple case studies span several chapters to better illustrate the business, operational, and technical risks inherent in IoT deployments.
Explains sources of risk across IoT architectures: endpoints, network, and cloud-based data centersIncludes multiple case studies threaded through several chapters covering business, operational, and technical risk issuesOffers insight from Intel (McAfee) insiders about emerging tools and techniques for real-world IoT systems

The Host in the Machine - Examining the Digital in the Social (Paperback): Angela Thomas-Jones The Host in the Machine - Examining the Digital in the Social (Paperback)
Angela Thomas-Jones
R1,318 Discovery Miles 13 180 Ships in 10 - 15 working days

This book tackles online social networks by navigating these systems from the birth to the death of their digital presence. Navigating the social within the digital can be a contentious undertaking, as social networks confuse the boundary between offline and online relationships. These systems work to bring people together in an online environment, yet participation can dislocate users from other relationships and deviant online behaviour can create offline issues. The author begins by examining the creation of a digital presence in online networks popularized by websites such as Facebook and MySpace. The book explores how the digital presence influences how social, cultural and professional relationships are discovered, forged, maintained and broken, and journeys through the popular criticisms of social networking such as employee time-wasting, bullying, stalking, the alleged links between social networks and suicide and the decline of a user s public image. Social networks are often treated as morally ambiguous spaces, which highlights a dissonance between digital and social literacies. This discord is approached through an exploration of the everyday undercurrents present in social networks. The discussion of the digital presence ends by addressing the intricacies of becoming digitally dead, which explores how a user removes their identity, with finality, from social networks and the entire web.
Identifies the undercurrents present in social networks and explores how these influence everyday lifeProvides insight into how the digital presence insidiously encroaches on offline aspects of a user s lifeExamines the idea of becoming digitally dead by discussing the often taboo subject of virtual and non-virtual suicide in the context of social networks"

Practical Industrial Data Communications - Best Practice Techniques (Paperback): Deon Reynders, Steve Mackay, Edwin Wright Practical Industrial Data Communications - Best Practice Techniques (Paperback)
Deon Reynders, Steve Mackay, Edwin Wright
R1,452 Discovery Miles 14 520 Ships in 10 - 15 working days

The objective of this book is to outline the best practice in designing, installing, commissioning and troubleshooting industrial data communications systems. In any given plant, factory or installation there are a myriad of different industrial communications standards used and the key to successful implementation is the degree to which the entire system integrates and works together.
With so many different standards on the market today, the debate is not about what is the best - be it Foundation Fieldbus, Profibus, Devicenet or Industrial Ethernet but rather about selecting the most appropriate technologies and standards for a given application and then ensuring that best practice is followed in designing, installing and commissioning the data communications links to ensure they run fault-free. The industrial data communications systems in your plant underpin your entire operation. It is critical that you apply best practice in designing, installing and fixing any problems that may occur. This book distills all the tips and tricks with the benefit of many years of experience and gives the best proven practices to follow.
The main steps in using today's communications technologies involve selecting the correct technology and standards for your plant based on your requirements; doing the design of the overall system; installing the cabling and then commissioning the system. Fiber Optic cabling is generally accepted as the best approach for physical communications but there are obviously areas where you will be forced to use copper wiring and, indeed, wireless communications. This book outlines the critical rules followed in installing the data communications physical transport media and then ensuring that the installation will be trouble-free for years to come.
The important point to make is that with today s wide range of protocols available, you only need to know how to select, install and maintain them in the most cost-effective manner for your plant or factory - knowledge of the minute details of the protocols is not necessary.
*An engineer's guide to communications systems using fiber optic cabling, copper cabling and wireless technology
*Covers: selection of technology and standards - system design - installation of equipment and cabling - commissioning and maintenance
*Crammed with practical techniques and know how - written by engineers for engineers"

Digital Signal Processing and Applications (Paperback, 2nd edition): Dag Stranneby Digital Signal Processing and Applications (Paperback, 2nd edition)
Dag Stranneby
R1,371 Discovery Miles 13 710 Ships in 10 - 15 working days

A uniquely practical DSP text, this book gives a thorough understanding of the principles and applications of DSP with a minimum of mathematics, and provides the reader with an introduction to DSP applications in telecoms, control engineering and measurement and data analysis systems.
The new edition contains:
- Expanded coverage of the basic concepts to aid understanding
- New sections on filter sysnthesis, control theory and contemporary topics of speech and image recognition
- Full solutions to all questions and exercises in the book
- A complete on-line resource
The on-line resource offers instructors and students complete lecture notes, lecture videos, PowerPoint slides for presentations, final exams and solutions, project exercises, URLs to DSP applet experiment animations and e-meeting software for direct communication with the authors.
Assuming the reader already has some prior knowledge of signal theory, this textbook will be highly suitable for undergraduate and postgraduate students in electrical and electronic engineering taking introductory and advanced courses in DSP, as well as courses in communications and control systems engineering. It will also prove an invaluable introduction to DSP and its applications for the professional engineer.
- Expanded coverage of the basic concepts to aid understanding, along with a wide range of DSP applications
- New textbook features included throughout, including learning objectives, summary
sections, exercises and worked examples to increase accessibility of the text
- Full solutions to all questions and exercises included in the book, with extra resources on-line

Practical Modern SCADA Protocols - DNP3, 60870.5 and Related Systems (Paperback): Gordon Clarke, Deon Reynders Practical Modern SCADA Protocols - DNP3, 60870.5 and Related Systems (Paperback)
Gordon Clarke, Deon Reynders
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

SCADA (Supervisory Control and Data Acquisition) systems are at the heart of the modern industrial enterprise ranging from mining plants, water and electrical utility installations to oil and gas plants. In a market that is crowded with high-level monographs and reference guides, more practical information for professional engineers is required. This book covers the essentials of SCADA communication systems focussing on DNP3, the IEC 60870.5 standard and other new developments in this area. It commences with a brief review of the fundamentals of SCADA systems' hardware, software and the communications systems (such as RS-232, RS-485, Ethernet and TCP/IP) that connect the SCADA Modules together. A solid review is then done on the DNP3 and IEC 60870.5 protocols where its features, message structure, practical benefits and applications are discussed. This book provides you with the knowledge to design your next SCADA system more effectively with a focus on using the latest communications technologies available.
* Covers the essentials of SCADA communication systems and other new developments in this area
* Covers a wide range of specialist networking topics and other topics ideal for practicing engineers and technicians looking to further and develop their knowledge of the subject
* Extremely timely subject as the industry has made a strong movement towards standard protocols in modern SCADA communications systems

Practical Industrial Data Networks - Design, Installation and Troubleshooting (Paperback, 1st ed.): Steve Mackay, Edwin Wright,... Practical Industrial Data Networks - Design, Installation and Troubleshooting (Paperback, 1st ed.)
Steve Mackay, Edwin Wright, John Park, Deon Reynolds
R1,452 Discovery Miles 14 520 Ships in 10 - 15 working days

There are many data communications titles covering design, installation, etc, but almost none that specifically focus on industrial networks, which are an essential part of the day-to-day work of industrial control systems engineers, and the main focus of an increasingly large group of network specialists.
The focus of this book makes it uniquely relevant to control engineers and network designers working in this area. The industrial application of networking is explored in terms of design, installation and troubleshooting, building the skills required to identify, prevent and fix common industrial data communications problems - both at the design stage and in the maintenance phase.
The focus of this book is 'outside the box'. The emphasis goes beyond typical communications issues and theory to provide the necessary toolkit of knowledge to solve industrial communications problems covering RS-232, RS-485, Modbus, Fieldbus, DeviceNet, Ethernet and TCP/IP. The idea of the book is that in reading it you should be able to walk onto your plant, or facility, and troubleshoot and fix communications problems as quickly as possible. This book is the only title that addresses the nuts-and-bolts issues involved in design, installation and troubleshooting that are the day-to-day concern of engineers and network specialists working in industry.
* Provides a unique focus on the industrial application of data networks
* Emphasis goes beyond typical communications issues and theory to provide the necessary toolkit of knowledge to solve industrial communications problems
* Provides the tools to allow engineers in various plants or facilities to troubleshoot and fix communications problems as quickly as possible

Introduction to Copper Cabling - Applications for Telecommunications, Data Communications and Networking (Paperback): John Crisp Introduction to Copper Cabling - Applications for Telecommunications, Data Communications and Networking (Paperback)
John Crisp
R967 Discovery Miles 9 670 Ships in 10 - 15 working days

Because this is a book for engineers the practical coverage is reinforced by use of the latest interanational standards, in particular BICSI standards (USA and international) and EU requirements. This will make the book ideal for the large number of industry-based training courses. Coverage has also been matched to the requirements of the revised City & Guilds 3466-04 course.
*Covers the real-world issues of selection, design, installation, testing, safety, legislation... neglected by university texts
*An easy-to-read introduction that assumes no prior knowledge beyond basic concepts of voltage and current - ideal for non-specialists as well as practitioners
*Covers new BICSI (US / international) regulations and EU framework

Cable Engineering for Local Area Networks (Hardcover): B.J. Elliott Cable Engineering for Local Area Networks (Hardcover)
B.J. Elliott
R3,208 Discovery Miles 32 080 Ships in 10 - 15 working days

This book provides a complete guide to the design, procurement, installation and testing procedures for local area networks (LANs) using both copper and optical fibre cable technology. International, European and American LAN and premises cabling standards are explained and compared including the latest Category 5, Category 6 and Category 7 proposals. The latest standards in testing, electromagnetic compatibility (EMC) compliance and fire safety are also covered in detail.
By describing the theory as well as the practical issues involved, this book is an unrivalled source of information for those who need to understand, at a time of very rapid change, the complexities of today's office-based LANs.
British courses such as City and Guilds course 3466, Copper and Optical Communications
C & G courses in Telecommunications and Electronics Engineering 2720, 2760 and 3478
NVQ and SNVQ courses on copper and fibre communications technology, levels one to five
Future qualifications to be developed by the European Institute of Telecommunications Engineering and the European Intelligent buildings group
American Certified Electronics Technician, Certified Fiber Optics Installer, Certified Network Systems Technician and Telecommunications Electronics Technician courses
BICSI courses such as RCDD where the book's coverage of European and international standards is very useful
BTEC and BSc courses on electronic and communications engineering
In addition it is a valuable resource for IT managers, consultants, cable installation engineers and system designers who need to understand the technology and physics behind the subject and the huge range of standards that apply to cable engineering

PC Interfacing (Paperback, 3rd ed.): Pei An PC Interfacing (Paperback, 3rd ed.)
Pei An
R1,213 Discovery Miles 12 130 Ships in 10 - 15 working days

The main links with your PC and the outside world are the centronic port, used for connecting the printer, the RS232 port, used for the mouse, and the games port for a joystick. This book explores how these input/output (I/O) ports can be put to use through a range of other interfacing applications. This is especially useful for laptop and palmtop PCs which cannot be fitted with internal I/O cards. A novel approach is taken by this book, combining the hardware through which the ports can be explored, and the software programming needed to carry out a range of experiments.
Circuits are provided for simple testing tools, and three experimental boards - which can also be purchased ready-made. Ready-to-run TurboPascal programs are available on the Newnes web site.
A huge range of applications are considered, turning the PC into a flexible core of a variety of systems. External devices considered include opto-isolator drivers, power drivers, LED drivers, relay drivers, special driver ICs, and methods of driving opto-isolated zero-crossing solid state relays, stepper motors, sound generating devices and displays. Ways of gathering information from the outside world are given, as well as connection to digital devices, remote control and digital communication.
As well as teaching in this field, Pei An has written numerous articles for magazines such as Electronics World and Electronics Today International.

A hands-on guide to exploring your PC's input/output ports
Covers the hardware and software aspects of interfacing
An exciting project-based approach to an important subject area

Network Routing, Volume 8 (Hardcover): M.O. Ball, T.L. Magnanti, B. L. Monma, George L. Nemhauser Network Routing, Volume 8 (Hardcover)
M.O. Ball, T.L. Magnanti, B. L. Monma, George L. Nemhauser
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

The papers in this volume consider a general area of study known as network routing. The underlying problems are conceptually simple, yet mathematically complex and challenging. How can we best route material or people from one place to another? Or, how can we best design a system (for instance locate facilities) to provide services and goods as efficiently and equitably as possible? The problems encountered in answering these questions often have an underlying combinatorial structure, for example, either we dispatch a vehicle or we do not, or we use one particular route or another. The problems also typically have an underlying network structure (a communication or transportation network). In addition, models for these problems are often very large with hundreds or thousands of constraints and variables. A companion volume in the "Handbook" series, entitled "Network Models", treats basic network models such as minimum cost flows, matching and the travelling salesman problem, as well as, several complex network topics, not directly related to routing, such as network design and network reliability.

CCNA 200-301 Network Simulator (Digital product license key): Sean Wilkins CCNA 200-301 Network Simulator (Digital product license key)
Sean Wilkins
R2,877 Discovery Miles 28 770 Ships in 10 - 15 working days

CCNA Interactive Learning: More than 300 labs More than 4,000 hands-on tasks Four Kinds of Labs: Skill Builders Subnetting Exercises Configuration Scenarios Troubleshooting Scenarios The CCNA 200-301 Network Simulator is a single-user software package. It helps you develop and improve hands-on configuration and troubleshooting skills without the investment in expensive lab hardware. This state-of-the-art, interactive simulation software enables you to practice your networking skills with more than 300 structured labs designed to help you learn by doing, the most effective method of learning. Experience realistic network device responses as you perform each lab, which include detailed instructions, topology diagrams, critical-thinking questions, hints, and answers. Working through the labs, you will quickly become proficient with all the common Cisco IOS version 15 router and switch commands on the CCNA exam. Unlike other simulators on the market, the lab scenarios included in the CCNA 200-301 Network Simulator are far more complex, challenging you to learn how to perform real-world network configuration and troubleshooting tasks. Master the hands-on skills needed to succeed on the CCNA exam, including: Network fundamentals Network access IP connectivity IP services Security fundamentals IP Subnetting Skill Builders: These 175+ labs are narrowly focused, enabling you to practice your configuration skills on a single topic. Coverage includes: Interface settings and status Router and Switch CLI Exec Mode and config process Telnet, Ping, Traceroute, and terminal history Switch IP address, connectivity, and forwarding PC IP commands Configuring IP addresses Subnet Zero IP addressing and IPv6 address configuration CDP and LLDP VLANs and Trunking Router-on-a-stick STP and MLS Static and Dynamic EtherChannel Wireless LAN Controllers Connected, static, and default routes OSPF SSH NAT NTP Router and switch security fundamentals ACL CHCP Dynamic ARP Port security IOS backup Subnetting Exercises: These 80 labs help you to perform subnetting calculations quickly and accurately, a critical skill for success on the CCNA exam. Topics covered include: IPv4 and IPv6 subnet ID calculation IP address rejection IP route selection VLSM overlaps IPv6 EUI-64 calculation Selecting VLSM routes Configuration Scenarios: These 40+ labs are more broadly focused, combining multiple technologies into configuration scenarios that mimic real-world environments. These labs are longer and more complex,challenging you to put your configuration skills to the test. Topics covered include: IP and MAC comparisons Switch IP connectivity and security Subnetting and addressing IP addressing and configuration IPv6 configuraiton Switch interfaces and forwarding VLAN trunking STP analysis, configuration, and prediction Wireless LAN Controllers Static routing Configuring default routes OSPF Router-on-a-stick to MLS SSH and Telnet NAT ACL Password recovery Rebuilding a configuration Troubleshooting Scenarios: These 18 labs present typical troubleshooting scenarios and require you to explore the misconfigured network, isolate the issues, and correct the problems. These are very complicated and realistic scenarios that truly test your ability to perform the job of a network engineer. Topics covered include: Switch forwarding Path analysis and troubleshooting IPv4/IPv6 addressing IP routing OSPF VLAN troubleshooting STP Network discovery Port security System requirements: Operating Systems: Windows 10 (32/64 bit) Windows 8.1 (32/64 bit) Mac OS 10.15 (Catalina) Mac OS 10.14 (Mojave) Mac OS 10.13 (High Sierra) Free Storage Space: 1 GB (minimum) System memory (RAM): 4 GB (minimum) Processor: i3 3.4 GHz (minimum) and above Software Pre-requisites: Node JS 10 PDF reader Monitor resolution: Minimum resolution: 1024 X 768 Best viewed: 1280 X 800 and above Internet speed: 2 Mbps (minimum) is needed only during software activation, reporting feedback and receiving updates. After activation, Internet is not needed for accessing the labs in the application. Language: English (US)

PCI Dss: A Pocket Guide (Paperback, 6th ed.): IT Governance PCI Dss: A Pocket Guide (Paperback, 6th ed.)
IT Governance
R392 Discovery Miles 3 920 Ships in 10 - 15 working days

This pocket guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource. It will teach you how to protect your customers' cardholder data with best practice from the Standard.

The Gathering Cloud (Paperback): J. R. Carpenter The Gathering Cloud (Paperback)
J. R. Carpenter
R396 Discovery Miles 3 960 Ships in 10 - 15 working days
Two-Factor Authentication (Paperback): Mark Stanislav Two-Factor Authentication (Paperback)
Mark Stanislav; Edited by It Governance Publishing
R507 Discovery Miles 5 070 Ships in 10 - 15 working days

Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.

ISO27001/ISO27002 - A Pocket Guide (Paperback): Alan Calder ISO27001/ISO27002 - A Pocket Guide (Paperback)
Alan Calder
R647 Discovery Miles 6 470 Ships in 10 - 15 working days

ISO/IEC 27001:2005 is an international standard for information security management systems (ISMSs). Closely allied to ISO/IEC 27002:2005 (which used to be known as ISO17799), this standard (sometimes called the ISMS standard) can help organisations meet all their information-related regulatory compliance objectives and can help them prepare and position themselves for new and emerging regulations. Information is the lifeblood of today s organis-ation and, therefore, ensuring that information is simultaneously protected and available to those who need it is essential to modern business operations. Information systems are not usually designed from the outset to be secure. Technical security measures and checklists are limited in their ability to protect a complete information system. Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. ISO/IEC 27001 provides the specification for an information security management system and, in the related Code of Practice, ISO/IEC 27002, it draws on the knowledge of a group of experienced information security practitioners in a wide range of significant organisations across more than 40 countries to set out best practice in information security. An ISO27001-compliant system will provide a systematic approach to ensuring the availability, confidentiality and integrity of corporate information. The controls of ISO27001 are based on identifying and combating the entire range of potential risks to the organisation s information assets. This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Key features include: The ISO/IEC 27000 Family of Information Security Standards Background to the Standards Specification vs Code of Practice Certification process The ISMS and ISO27001 Overview of ISO/IEC 27001:2005 Documentation & Records Management Responsibility Policy & Scope Risk Assessment Implementation

BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback): Jenny Phillips, Alan... BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback)
Jenny Phillips, Alan Jarvis, Mark Fishpool, Richard McGill, Tim Cook, …
R1,018 Discovery Miles 10 180 Ships in 10 - 15 working days

Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.

Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (Hardcover): Arshi Naim, Praveen Kumar Malik,... Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (Hardcover)
Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi
R6,200 Discovery Miles 62 000 Ships in 18 - 22 working days

The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.

Trustworthy Autonomic Computing (Hardcover): Thaddeus Eze Trustworthy Autonomic Computing (Hardcover)
Thaddeus Eze
R2,997 R2,712 Discovery Miles 27 120 Save R285 (10%) Ships in 18 - 22 working days

The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,370 Discovery Miles 53 700
Demystifying Graph Data Science - Graph…
Pethuru Raj, Abhishek Kumar, … Hardcover R3,333 R3,010 Discovery Miles 30 100
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R5,931 Discovery Miles 59 310
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
E-Learning and Digital Education in the…
M. Mahruf C. Shohel Hardcover R3,584 Discovery Miles 35 840
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R9,276 Discovery Miles 92 760
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270

 

Partners