0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (322)
  • R250 - R500 (930)
  • R500+ (16,445)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover): Balwinder Raj, Brij B. Gupta, Jeetendra... Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover)
Balwinder Raj, Brij B. Gupta, Jeetendra Singh
R3,031 Discovery Miles 30 310 Ships in 9 - 15 working days

Unique selling point: * Contains electronics device, Circuits, systems as well as applications of Integrated Circuits in healthcare and security never before considered Core audience: * Researchers and post graduates Place in the market: * Includes key new finding of electronic devices for Security Applications, and Integrated Circutis for healthcare and security Applications with advanced

Blue Shark Team-Building - Leading High-Performance Teams during a Crisis (Paperback): Rizwan Sheikh Blue Shark Team-Building - Leading High-Performance Teams during a Crisis (Paperback)
Rizwan Sheikh
R1,433 Discovery Miles 14 330 Ships in 9 - 15 working days

Teams working in a crisis are operating in a high turbulence environment. Blue Shark Teams thrive in a crisis. They swim through turbulence and glide to project success. This book reveals the concepts and practical insight on how to create and lead Blue Shark Teams. The Blue Shark Model of Leading High-Performance Teams is based on Daniel Goleman's emotional intelligence model and Bruce Tuckman's team-building model (forming, storming, norming, performing, and adjourning). This book shows how to apply these models to large companies, small-to-medium size businesses, and projects during a crisis. It explains how managers can develop their leadership style and lead high-performance teams. A real-life case study, which was a success story during the COVID-19 pandemic, is discussed to elaborate the team-building and emotional intelligence models. The lessons learned from this case study can be applied to any crisis in any industry across the spectrum, including healthcare, IT, telecom, construction, manufacturing, oil and gas, airlines, financial services, retail, public sector, and consulting. The book arms executives and managers with the concepts and techniques to lead and manage projects, teams, and companies during turbulent and volatile times. If you are a CEO, CIO, CTO, or CXO of a Fortune 500 company, a mid-to-small size Business Owner, a Project Manager, or a Senior Executive facing a crisis, then this book is for you. It describes real-life case studies and projects that shows how the theoretical frameworks and models developed by leading researchers can be applied successfully to companies and projects, especially during a crisis and pandemic such as COVID-19.

Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R3,037 Discovery Miles 30 370 Ships in 9 - 15 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

Cloud Computing Strategies (Hardcover): Dimitris N Chorafas Cloud Computing Strategies (Hardcover)
Dimitris N Chorafas
R4,014 Discovery Miles 40 140 Ships in 12 - 17 working days

A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments. Illustrated with numerous examples and case studies, the book examines security, privacy, data ownership, and data protection in the cloud. It also: Explains how and why your company can benefit from Open Software and onDemand Services Identifies various cloud providers, their services, and their content as a basis for evaluating cost effectiveness Provides authoritative guidance on how to transition from a legacy system to the cloud Includes helpful tips for managing cloud vendor relationships and avoiding vendor lock-in Whether you're already in the cloud or just considering it, the text provides the unbiased understanding of the strengths and weaknesses of cloud computing needed to make informed decisions regarding its future in your organization. The book's strength is that it supplies authoritative insight on everything needed to decide if you should make a transition to the cloud.

Zero Trust Journey Across the Digital Estate (Paperback): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Paperback)
Abbas Kudrati, Binil A. Pillai
R1,414 Discovery Miles 14 140 Ships in 9 - 15 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,730 Discovery Miles 27 300 Ships in 9 - 15 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,405 Discovery Miles 14 050 Ships in 9 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Futuristic Research Trends and Applications of Internet of Things (Hardcover): Bhawana Rudra, Anshul Verma, Shekhar Verma,... Futuristic Research Trends and Applications of Internet of Things (Hardcover)
Bhawana Rudra, Anshul Verma, Shekhar Verma, Bhanu Shrestha
R3,194 Discovery Miles 31 940 Ships in 9 - 15 working days

The Internet of Things (IoT) is an interconnection of several devices, networks, technologies, and human resources to achieve a common goal. A variety of IoT-based applications are being used in different sectors and have succeeded in providing huge benefits to the users. As a revolution, IoT overtook the entire global landscape with its presence in almost every sector, including smart cities, smart grid, intelligent transportation, healthcare, education, and so on. This technological revolution also moved to the machines, converting them into intelligent computers that can make real-time decisions and communicate with each other, forming an Internet of Systems/Machines. The use of secure light-weight protocols will help us in developing environment-friendly and energy-efficient IoT systems. IoT is an emerging and recent area of research, adopted for many applications, and there is a need to investigate further challenges in all aspects of it. This book will provide information on fundamentals, architectures, communication protocols, use of AI, existing applications, and emerging research trends in IoT. It follows a theoretical approach to describe the fundamentals for beginners as well as a practical approach with the implementation of case studies for intermediate and advanced readers. The book will be beneficial for academicians, researchers, developers, and engineers who work in or are interested in fields related to IoT. This book serves as a reference for graduate and postgraduate courses in computer science, computer engineering, and information technology streams.

Security Awareness Design in the New Normal Age (Hardcover): Wendy F. Goucher Security Awareness Design in the New Normal Age (Hardcover)
Wendy F. Goucher
R1,855 Discovery Miles 18 550 Ships in 9 - 15 working days

Unique selling point: * Uses research and experience of designing and implementing security awareness programs in the modern workplace to examine at how you can make your security awareness message more impactful. Core audience: * Chief Information Security Officers, Data Protection Managers, Security Awareness trainers and designers and Cyber Security Managers Place in the market: * Considers the challenge of maintaining good security awareness with Post-COVID work practices

CCSP For Dummies with Online Practice (Paperback): A. Deane CCSP For Dummies with Online Practice (Paperback)
A. Deane
R1,139 R792 Discovery Miles 7 920 Save R347 (30%) Ships in 9 - 15 working days

Secure your CSSP certification CCSP is the world's leading Cloud Security certification. It covers the advanced technical skills and knowledge to design, manage, and secure data, applications, and infrastructure in the cloud using best practices, policies, and procedures. If you're a cloud security professional seeking your CSSP certification, this book is a perfect way to prepare for the exam. Covering in detail all six domains, the expert advice in this book gives you key information you'll need to pass the exam. In addition to the information covered on the exam, you'll get tips on setting up a study plan, tips for exam day, and access to an online test bank of questions. Key information for all six exam domains Test -taking and exam day tips and tricks Free online practice questions and flashcards Coverage of the core concepts From getting familiar with the core concepts to establishing a study plan, this book is all you need to hang your hat on that certification!

Custom Search - Discover more: - A Complete Guide to Google Programmable Search Engines (Paperback): Irina Shamaeva, David... Custom Search - Discover more: - A Complete Guide to Google Programmable Search Engines (Paperback)
Irina Shamaeva, David Michael Galley
R1,408 Discovery Miles 14 080 Ships in 9 - 15 working days

Google's Programmable Search Engines (PSEs, previously called Custom Search Engines) provide search opportunities that are unavailable with any other tool. PSEs have advanced settings and search operators that are not supported by "regular" Google. With PSEs, it is possible to perform filtered searches within parts of the web as if they were databases! While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Even fewer know about powerful PSE-only search operators. The main reason PSEs are not as popular as they should be is that it is not easy to get educated on PSE creation. There is little information online and no books (other than this one) on the subject. Even less info is available on the "structured" operators that allow for filtered searches. The first of its kind, this book hopes to popularize these fun and powerful tools so that many more people can include PSEs in their work. Key Features: A detailed introduction to creating PSEs, including info absent in Google's help A "hack" for creating PSEs that look for profiles in seconds An introduction to advanced PSE-only search operators allowed to perform filtered searches of parts of the web A "hack" for expanding Google's search limits to 500 terms Use cases, examples, and approaches that would be educational for those doing online research This book will be of interest to researchers, OSINT specialists, investigative journalists, Competitive Intelligence people, recruiters, and Sourcers, to name a few categories, and to the general public interested in how to search better.

AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover): Balwinder Raj, Brij B. Gupta, Shingo... AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover)
Balwinder Raj, Brij B. Gupta, Shingo Yamaguchi, Sandeep Singh Gill
R3,390 Discovery Miles 33 900 Ships in 12 - 17 working days

i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications

Intelligent Analytics for Industry 4.0 Applications (Hardcover): Avinash Chandra Pandey, Abhishek Verma, Vijaypal Singh Rathor,... Intelligent Analytics for Industry 4.0 Applications (Hardcover)
Avinash Chandra Pandey, Abhishek Verma, Vijaypal Singh Rathor, Munesh Singh, Ashutosh Kumar Singh
R3,089 Discovery Miles 30 890 Ships in 12 - 17 working days

1. Covers latest concepts in intelligent analytics for industry 4.0. 2. Presents the applications of intelligent analytics for various industry 4.0 domains. 3. Covers latest research topics in the field. 4. Written in a comprehensive and simple manner. 5. The text is accompanied by tables and illustrative figures for better understanding of the topic.

Docker - Up & Running - Shipping Reliable Containers in Production (Paperback, 3rd Revised edition): Sean P. Kane, Karl Matthias Docker - Up & Running - Shipping Reliable Containers in Production (Paperback, 3rd Revised edition)
Sean P. Kane, Karl Matthias
R7,018 Discovery Miles 70 180 Ships in 12 - 17 working days

Docker and Linux containers have fundamentally changed the way that organizations develop, deliver, and run software at scale. But understanding why these tools are important and how they can be successfully integrated into your organization's ecosystem can be challenging. This fully updated guide provides developers, operators, architects, and technical managers with a thorough understanding of the Docker tool set and how containers can improve almost every aspect of modern software delivery and management. This edition includes significant updates to the examples and explanations that reflect the substantial changes that have occurred since Docker was first released almost a decade ago. Sean Kane and Karl Matthias have updated the text to reflect best practices and to provide additional coverage of new features like BuildKit, multi-architecture image support, rootless containers, and much more. Learn how Docker and Linux containers integrate with cloud services and Kubernetes Experience building OCI images, plus deploying and managing Linux containers with powerful command-line tools Understand how OCI images simplify dependency management and deployment workflow for your applications Learn practical techniques for deploying and testing Linux containers in production Deploy production containers at scale wherever you need them Explore advanced Docker topics, including deployment tools, networking, orchestration, security, and configuration

SRv6 Network Programming - Ushering in a New Era of IP Networks (Hardcover): Zhenbin Li, Zhibo Hu, Cheng Li SRv6 Network Programming - Ushering in a New Era of IP Networks (Hardcover)
Zhenbin Li, Zhibo Hu, Cheng Li; Contributions by Chang-Qing Yang
R3,952 Discovery Miles 39 520 Ships in 9 - 15 working days

SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization.

Cloud Computing For Dummies, Second Edition (Paperback, 2nd Edition): JS Hurwitz Cloud Computing For Dummies, Second Edition (Paperback, 2nd Edition)
JS Hurwitz
R707 Discovery Miles 7 070 Ships in 12 - 17 working days

Get your head--and your business--into the Cloud Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it's become a real and important part of our information architecture--and tech professionals who ignore it or try to skim their way through risk falling behind rapidly. The new edition of Cloud Computing For Dummies gets you up to speed fast, clarifying your Cloud options, showing you where can save you time and money, giving you ways to frame your decisions, and helping you avoid weeks of research. In a friendly, easy-to-follow style, Cloud Computing For Dummies, 2nd Edition demystifies the Cloud's virtual landscape, breaking up a complex and multi-layered topic into simple explanations that will make the various benefits clear and ultimately guide you toward making the most appropriate choices for your organization. Know the business case for the Cloud Understand hybrid and multi-cloud options Develop your Cloud strategy Get tips on best practices The Cloud is everywhere, and it can deliver amazing benefits to our lives and businesses. Get a much clearer vision of exactly how with Cloud Computing For Dummies--and you'll begin to see that the sky really is the limit!

Data Communications Network Auditing - How to Save Hundreds of Thousands of Dollars and Still Improve Network Response Time... Data Communications Network Auditing - How to Save Hundreds of Thousands of Dollars and Still Improve Network Response Time Network Performance and Network Availability (Paperback)
Bruce Griffis
R1,790 Discovery Miles 17 900 Ships in 12 - 17 working days

This book contains product specific information based on Cisco router command line interface, and IBM's Net view. It is designed to help us understand the "parts and pieces" of communications and determine how components fit together, and what they look like on your bill.

Google Cloud Certified Associate Cloud Engineer St udy Guide, 2nd edition (Paperback, 2nd Edition): Sullivan Google Cloud Certified Associate Cloud Engineer St udy Guide, 2nd edition (Paperback, 2nd Edition)
Sullivan
R967 Discovery Miles 9 670 Ships in 12 - 17 working days

Quickly and efficiently prepare for the Google Associate Cloud Engineer certification with the proven Sybex method In the newly updated Second Edition of Google Cloud Certified Associate Cloud Engineer Study Guide, expert engineer and tech educator Dan Sullivan delivers an essential handbook for anyone preparing for the challenging Associate Cloud Engineer exam offered by Google and for those seeking to upgrade their Google Cloud engineering skillset. The book provides readers with coverage of every domain and competency tested by the Associate Cloud Engineer exam, including how to select the right Google compute service from the wide variety of choices, how to choose the best storage option for your services, and how to implement appropriate security controls and network functionality. This guide also offers: A strong emphasis on transforming readers into competent, job-ready applicants, with a focus on building skills in high demand by contemporary employers Concrete test-taking strategies, techniques, and tips to help readers conquer exam anxiety Complimentary access to a comprehensive online learning environment, complete with practice tests A must-have resource for practicing and aspiring Google Cloud engineers, Google Cloud Certified Associate Cloud Engineer Study Guide allows you to prepare for this challenging certification efficiently and completely.

The Official (ISC)2 CCSP CBK Reference, 4th Edition (Hardcover): a. Kraus The Official (ISC)2 CCSP CBK Reference, 4th Edition (Hardcover)
a. Kraus
R1,417 Discovery Miles 14 170 Ships in 12 - 17 working days

The only official body of knowledge for CCSP--the most popular cloud security credential--fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)2 Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals. This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certification. Every essential area of cloud security is covered, including implementation, architecture, operations, controls, and immediate and long-term responses. Developed by (ISC)2, the world leader in professional cybersecurity certification and training, this indispensable guide: Covers the six CCSP domains and over 150 detailed objectives Provides guidance on real-world best practices and techniques Includes illustrated examples, tables, and diagrams The Official (ISC)2 Guide to the CCSP CBK is a vital ongoing resource for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.

IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover): Fred Cohen IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover)
Fred Cohen
R3,692 Discovery Miles 36 920 Ships in 12 - 17 working days

The IT Security Governance Guidebook with Security Program Metrics provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying downloadable resources offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.

Mastering Windows Server 2022 with Azure Cloud Services - IaaS, PaaS, and SaaS (Paperback): W Panek Mastering Windows Server 2022 with Azure Cloud Services - IaaS, PaaS, and SaaS (Paperback)
W Panek
R1,092 Discovery Miles 10 920 Ships in 12 - 17 working days

Extend your on-premises Windows Server deployments to the cloud with Azure In Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS, 5-time Microsoft MVP Winner William Panek delivers a comprehensive and practical blueprint for planning, implementing, and managing environments that include Azure IaaS-hosted Windows Server-based workloads. You'll learn to use the expansive, hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, PaaS, and SaaS, and how to manage and secure Azure virtual machines running Windows Server 2022. This book also offers: Foundational explanations of core Azure capabilities, including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) Explorations of the tools you'll need to implement Azure solutions, including Windows Admin Center and PowerShell Examples of implementing identity in Hybrid scenarios, including Azure AD DS on Azure IaaS and managed AD DS Perfect for IT professionals who manage on-premises Windows Server environments, seek to use Azure to manage server workloads, and want to secure virtual machines running on Windows Server 2022, Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS is also a must-read resource for anyone involved in administering or operating Microsoft Azure IaaS workloads.

A Guide to IT Contracting - Checklists, Tools, and Techniques (Hardcover, 2nd edition): Michael R Overly A Guide to IT Contracting - Checklists, Tools, and Techniques (Hardcover, 2nd edition)
Michael R Overly
R2,082 Discovery Miles 20 820 Ships in 9 - 15 working days

Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements. In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes downloadable resources with reusable checklists and complete glossary that defines key legal, business, and technical terms Costly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation.

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Paperback)
Aakanksha Tewari, Brij B. Gupta
R631 Discovery Miles 6 310 Ships in 9 - 15 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback)
Mark Tarallo
R1,177 Discovery Miles 11 770 Ships in 9 - 15 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,182 Discovery Miles 11 820 Ships in 9 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cloud Security For Dummies, 1st Edition
T. Coombs Paperback R832 R588 Discovery Miles 5 880
Quantum Computing For Dummies
William Hurley, Floyd Earl Smith Paperback R727 R522 Discovery Miles 5 220
Building Microservices
Sam Newman Paperback R1,212 R864 Discovery Miles 8 640
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,331 R1,194 Discovery Miles 11 940
Wireless Security Architecture…
J Minella Paperback R913 Discovery Miles 9 130
Cisco CyberOps Associate CBROPS 200-201…
Omar Santos Hardcover R1,401 Discovery Miles 14 010
Transforming Your Business with AWS…
P Abdoulaye Paperback R729 Discovery Miles 7 290
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Securing Remote Access in Palo Alto…
Tom Piens Paperback R1,303 Discovery Miles 13 030

 

Partners