0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (340)
  • R250 - R500 (929)
  • R500+ (16,259)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,330 R1,188 Discovery Miles 11 880 Save R142 (11%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Information Systems - What Every Business Student Needs to Know (Hardcover): Efrem G. Mallach Information Systems - What Every Business Student Needs to Know (Hardcover)
Efrem G. Mallach
R5,399 Discovery Miles 53 990 Ships in 12 - 17 working days

Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. Information Systems: What Every Business Student Needs to Know takes a new approach to the required information systems course for business majors.For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students once they are on the job. Review questions, discussion questions, and summaries are also included in each chapter to reinforce learning. The book is presented in four parts: About Information Systems: covers general information systems concepts that students need to know as they learn about real-world information systems Technology Fundamentals: supplies a foundation in information technology that fills the gaps most students have when they learn through trial and error Information Systems at Work: details the nitty-gritty of how actual companies use information systems in the real word Managing Information Systems: addresses the issues involved in selecting, developing, and managing information systems The text includes a running case study that follows two management information systems majors in college. As the two main characters study the information systems of a medical practice, students follow along and learn valuable lessons as they see how the case plays out. In addition to the running case study, each chapter also includes two mini cases that illustrate the concepts discussed in that chapter.Maintaining a focus on the essential concepts students must know before entering the business world, this book covers the subject of information systems in a manner that students will find accessible.

Responsible Graph Neural Networks (Hardcover): Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash Responsible Graph Neural Networks (Hardcover)
Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash
R2,257 Discovery Miles 22 570 Ships in 9 - 15 working days

More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

A Software Development Approach for Driving Competitiveness in Small Firms (Hardcover): Delroy Chevers A Software Development Approach for Driving Competitiveness in Small Firms (Hardcover)
Delroy Chevers
R2,666 Discovery Miles 26 660 Ships in 9 - 15 working days

Unique selling point: A rigorous examination of the influence of software development on competitiveness among small firms Core audience: Researchers and academics in business and MIS Place in the market: Academic reference with audiences in social science and computer science

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover)
Shaun Aghili
R2,993 Discovery Miles 29 930 Ships in 9 - 15 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

Information Technology and Organizational Learning - Managing Behavioral Change in the Digital Age (Hardcover, 3rd edition):... Information Technology and Organizational Learning - Managing Behavioral Change in the Digital Age (Hardcover, 3rd edition)
Arthur M. Langer
R4,533 Discovery Miles 45 330 Ships in 12 - 17 working days

Focusing on the critical role IT plays in organizational development, the book shows how to employ action learning to improve the competitiveness of an organization. Defining the current IT problem from an operational and strategic perspective, it presents a collection of case studies that illustrate key learning issues. It details a dynamic model for effective IT management through adaptive learning techniques-supplying proven educational theories and practices to foster the required changes in your staff. It examines existing organizational learning theories and the historical problems that occurred with companies that have used them, as well as those that have failed to use them.

Managing IT for Innovation - Dynamic Capabilities and Competitive Advantage (Paperback): Mitsuru Kodama Managing IT for Innovation - Dynamic Capabilities and Competitive Advantage (Paperback)
Mitsuru Kodama
R1,201 Discovery Miles 12 010 Ships in 9 - 15 working days

With recent advances in IT in areas such as AI and IoT, collaboration systems such as business chat, cloud services, conferencing systems, and unified communications are rapidly becoming widely used as new IT applications in global corporations' strategic activities. Through in-depth longitudinal studies of global corporations, the book presents a new theoretical framework and implications for IT-enabled dynamic capabilities using collaboration systems from the perspective of micro strategy theory and organization theory. The content of the book is based on longitudinal analyses that employ various qualitative research methods including ethnography, participant observation, action research and in-depth case studies of global corporations in Europe, the United States and Asia that actively use collaboration systems. It presents a new concept of micro dynamism whereby dynamic "IT-enabled knowledge communities" such as "IT-enabled communities of practice" and "IT-enabled strategic communities" create "IT-enabled dynamic capabilities" through the integration of four research streams - an information systems view, micro strategy view, micro organization view and knowledge-based view. The book demonstrates that collaboration systems create, maintain and develop "IT-enabled knowledge communities" within companies and are strategic IT applications for enhancing the competitiveness of companies in the ongoing creation of new innovation and the realization of sustainable growth in a 21st century knowledge-based society. This book is primarily written for academics, researchers and graduate students, but will also offer practical implications for business leaders and managers. Its use is anticipated not only in business and management schools, graduate schools and university education environments around the world but also in the broad business environment including management and leadership development training.

Responsible Graph Neural Networks (Paperback): Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash Responsible Graph Neural Networks (Paperback)
Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash
R1,337 Discovery Miles 13 370 Ships in 9 - 15 working days

More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

Artificial Intelligence Perspective for Smart Cities (Hardcover): Sezer Bozkus Kahyaoglu, Vahap Tecim Artificial Intelligence Perspective for Smart Cities (Hardcover)
Sezer Bozkus Kahyaoglu, Vahap Tecim
R2,990 Discovery Miles 29 900 Ships in 9 - 15 working days

1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.

Cisco CCNA Certification 2-Volume Set - Exam 200-301 (Paperback): T Lammle Cisco CCNA Certification 2-Volume Set - Exam 200-301 (Paperback)
T Lammle
R1,604 Discovery Miles 16 040 Ships in 12 - 17 working days

A two-volume set to help you prepare for success on the NEW Cisco CCNA Certification exam. Get certified and advance your technical career. To earn a Cisco Certified Network Associate (CCNA) certification, you only need to take one exam, which will validate your knowledge and skills related to everything from networking to automation. This inclusive, two-book set provides what you need to know to succeed on the new CCNA exam. The set includes Understanding Cisco Networking Technologies: Volume 1 and the CCNA Certification Study Guide: Volume 2. Understanding Cisco Networking Technologies provides comprehensive information and foundational knowledge about core Cisco technologies, helping you implement and administer Cisco solutions. The CCNA Certification Study Guide prepares you for the new CCNA certification Exam 200-301, which assesses your abilities related to network fundamentals. Both books cover a range of topics so you can get ready for the exam and apply your technical knowledge. Prepare for testing on network and security fundamentals Review network access concepts Solidify your knowledge related to IP connectivity and services Assess your automation and programmability skills Written by a Cisco expert, Todd Lammle, this set helps you master the concepts you need to succeed as a networking administrator. It also connects you to online interactive learning tools, including sample questions, a pre-assessment, practice exam, flashcards, and a glossary. If you want to earn the new CCNA certification and keep moving forward in your IT career, this book and study guide are for you.

Secret Key Cryptography (Paperback): Frank Rubin Secret Key Cryptography (Paperback)
Frank Rubin
R1,054 Discovery Miles 10 540 Ships in 12 - 17 working days

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes-including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches-including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers-even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS * Measure the strength of your ciphers and learn how to guarantee their security * Construct and incorporate data-compression codes * Generate true random numbers in bulk * Construct huge primes and safe primes * Add an undetectable backdoor to a cipher * Defeat hypothetical ultra computers that could be developed decades from now * Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required

Cryptocurrency Concepts, Technology, and Applications (Paperback): Jay Liebowitz Cryptocurrency Concepts, Technology, and Applications (Paperback)
Jay Liebowitz
R1,395 Discovery Miles 13 950 Ships in 9 - 15 working days

Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one’s portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency. In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including: Blockchain NFTs Data analytics and AI Crypto crime Crypto industry and regulation Crypto and public choice Consumer confidence Bitcoin and other cryptocurrencies. Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition)
Nick Catrantzos
R3,726 Discovery Miles 37 260 Ships in 9 - 15 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

The Secure Board - How To Be Confident That Your Organisation Is Cyber Safe (Paperback): Anna Leibel, Claire Pales The Secure Board - How To Be Confident That Your Organisation Is Cyber Safe (Paperback)
Anna Leibel, Claire Pales
R455 Discovery Miles 4 550 Ships in 10 - 15 working days
The Practice of Corporate Governance (Paperback): Bob Tricker The Practice of Corporate Governance (Paperback)
Bob Tricker
R939 Discovery Miles 9 390 Ships in 9 - 15 working days

This book offers a straight-forward guide to the fundamental work of governing bodies and the people who serve on them. The aim is of the book is to help every member serving on a governing body understand and improve their contribution to the entity and governing body they serve. The book is rooted in research, including five years' work by the author as a Research Fellow of Nuffield College, Oxford.

Guide to Operating Systems (Paperback, 6th edition): Greg Tomsho Guide to Operating Systems (Paperback, 6th edition)
Greg Tomsho
R1,309 R1,171 Discovery Miles 11 710 Save R138 (11%) Ships in 10 - 15 working days

Master the fundamental concepts of computer operating systems with Tomsho's GUIDE TO OPERATING SYSTEMS, 6th Edition. An excellent resource for training across different operating systems, this practical text equips you with key theory and technical information as you work with today's most popular operating systems, including Windows, macOS and Linux platforms. You will learn how general operating systems are organized and function as well as gain hands-on experience with OS installation, upgrading and configuration. Processors, file systems, networking, virtualization, security, device management, storage, OS maintenance and troubleshooting are covered in detail. In addition, the MindTap digital learning solution gives you a wealth of anywhere, anytime learning resources.

Botnets - Architectures, Countermeasures, and Challenges (Paperback): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Paperback)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R1,411 Discovery Miles 14 110 Ships in 9 - 15 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Antiterrorism and Threat Response - Planning and Implementation (Paperback): Ross Johnson Antiterrorism and Threat Response - Planning and Implementation (Paperback)
Ross Johnson
R1,827 Discovery Miles 18 270 Ships in 9 - 15 working days

One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense's antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book's antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists-setting them off balance and keeping them off balance-thereby disrupting their planning cycle and thwarting attack. The book helps security managers to: Understand the terrorist attack planning cycle Conduct a terrorism threat vulnerability assessment Develop an observation plan and the corresponding verification plan Understand how surveillance detection works Learn how pattern analysis wheels can be used to find weaknesses in security operations Appreciate the role of random antiterrorism measures and learn how to develop them Establish response plans for a wide variety of contingencies related to terrorist attack Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiques. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.

Research Advances in Intelligent Computing (Hardcover): Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg Research Advances in Intelligent Computing (Hardcover)
Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg
R2,976 Discovery Miles 29 760 Ships in 9 - 15 working days

Since the invention of computers or machines, scientists and researchers are trying very hard to enhance their capabilities to perform various tasks. As a consequence, the capabilities of computers are growing exponentially day by day in terms of diverse working domains, versatile jobs, processing speed, and reduced size. Now, we are in the race to make the computers or machines as intelligent as human beings. Artificial Intelligence (AI) came up as a way of making a computer or computer software think in the similar manner the intelligent humans think. AI is inspired by the study of human brain like how humans think, learn, decide and act while trying to solve a problem. The outcomes of this study are the basis of developing intelligent software and systems or Intelligent Computing (IC). An IC system has the capability of reasoning, learning, problem solving, perception, and linguistic intelligence. The IC systems consist of AI techniques as well as other emerging techniques that make a system intelligent. The use of intelligent computing has been seen in almost every sub-domain of computer science such as networking, software engineering, gaming, natural language processing, computer vision, image processing, data science, robotics, expert systems, and security. Now a days, the use of IC can also be seen for solving various complex problems in diverse domains such as for predicting disease in medical science, predicting land fertility or crop productivity in agriculture science, predicting market growth in economics, weather forecasting and so on. For all these reasons, this book presents the advances in AI techniques, under the umbrella of IC. In this context, the book includes the recent research works have been done in the areas of machine learning, neural networks, deep learning, evolutionary algorithms, genetic algorithms, swarm intelligence, fuzzy systems and so on. This book provides theoretical, algorithmic, simulation, and implementation-based recent research advancements related to the Intelligent Computing.

Blockchain Security from the Bottom Up: Securing a nd Preventing Attacks on Cryptocurrencies, Decentr alized Applications,... Blockchain Security from the Bottom Up: Securing a nd Preventing Attacks on Cryptocurrencies, Decentr alized Applications, NFTs, and Smart Contracts (Paperback)
HE Poston
R521 Discovery Miles 5 210 Ships in 12 - 17 working days

The gold standard in up-to-date blockchain cybersecurity handbooks In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology's ecosystem. You'll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution. You'll also find: Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work A can't-miss resource for blockchain and cybersecurity professionals seeking to stay on the cutting-edge of a rapidly evolving area, Blockchain Security from the Bottom Up will also earn a place on the bookshelves of software developers working with cryptocurrencies and other blockchain implementations.

Practical Cybersecurity Architecture - A guide to creating and implementing robust designs for cybersecurity architects... Practical Cybersecurity Architecture - A guide to creating and implementing robust designs for cybersecurity architects (Paperback)
Ed Moyle, Diana Kelley
R1,548 Discovery Miles 15 480 Ships in 10 - 15 working days

Plan and design robust security architectures to secure your organization's technology landscape and the applications you develop Key Features Leverage practical use cases to successfully architect complex security structures Learn risk assessment methodologies for the cloud, networks, and connected devices Understand cybersecurity architecture to implement effective solutions in medium-to-large enterprises Book DescriptionCybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others. What you will learn Explore ways to create your own architectures and analyze those from others Understand strategies for creating architectures for environments and applications Discover approaches to documentation using repeatable approaches and tools Delve into communication techniques for designs, goals, and requirements Focus on implementation strategies for designs that help reduce risk Become well-versed with methods to apply architectural discipline to your organization Who this book is forIf you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. This includes security practitioners, technology governance practitioners, systems auditors, and software developers invested in keeping their organizations secure. If you're new to cybersecurity architecture, the book takes you through the process step by step; for those who already work in the field and have some experience, the book presents strategies and techniques that will help them develop their skills further.

Future Communication Technology and Engineering - Proceedings of the 2014 International Conference on Future Communication... Future Communication Technology and Engineering - Proceedings of the 2014 International Conference on Future Communication Technology and Engineering (FCTE 2014), Shenzhen, China, 16-17 November 2014 (Hardcover)
Kennis Chan
R3,789 Discovery Miles 37 890 Ships in 12 - 17 working days

Future Communication Technology and Engineering is a collection of papers presented at the 2014 International Conference on Future Communication Technology and Engineering (Shenzhen, China 16-17 November 2014). Covering a wide range of topics (communication systems, automation and control engineering, electrical engineering), the book includes the state-of-art in research on communication technology, and will be of interest to academics and professionals in the above mentioned fields.

Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition): C Hadnagy Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition)
C Hadnagy
R830 R660 Discovery Miles 6 600 Save R170 (20%) Ships in 7 - 13 working days

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Ethical Digital Technology in Practice (Paperback): Simon Rogerson Ethical Digital Technology in Practice (Paperback)
Simon Rogerson
R1,621 Discovery Miles 16 210 Ships in 9 - 15 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Storytelling for New Technologies and Platforms - A Writer's Guide to Theme Parks, Virtual Reality, Board Games, Virtual... Storytelling for New Technologies and Platforms - A Writer's Guide to Theme Parks, Virtual Reality, Board Games, Virtual Assistants, and More (Paperback)
Ross Berger
R1,374 Discovery Miles 13 740 Ships in 9 - 15 working days

Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,667 R1,268 Discovery Miles 12 680
Linux Command Line and Shell Scripting…
R. Blum Paperback R1,192 R924 Discovery Miles 9 240
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,337 R1,199 Discovery Miles 11 990
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,192 R924 Discovery Miles 9 240
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,305 R1,172 Discovery Miles 11 720
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R622 Discovery Miles 6 220
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R1,171 R832 Discovery Miles 8 320
How I Rob Banks - And Other Such Places
F. C. Barker Hardcover R449 Discovery Miles 4 490
CEH v12 Certified Ethical Hacker Study…
Ric Messier Paperback R1,327 Discovery Miles 13 270

 

Partners