0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (876)
  • R500+ (13,566)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cloud Computing (Hardcover): Sam Revere Cloud Computing (Hardcover)
Sam Revere
R3,029 R2,745 Discovery Miles 27 450 Save R284 (9%) Ships in 18 - 22 working days
AWS Organizations User Guide (Hardcover): Documentation Team AWS Organizations User Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback): Babak Akhgar,... Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback)
Babak Akhgar, Gregory B Saathoff, Hamid R Arabnia, Richard Hill, Andrew Staniforth, …
R1,382 Discovery Miles 13 820 Ships in 10 - 15 working days

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security

TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R893 R812 Discovery Miles 8 120 Save R81 (9%) Ships in 18 - 22 working days
Amazon Polly Developer Guide (Hardcover): Documentation Team Amazon Polly Developer Guide (Hardcover)
Documentation Team
R1,172 Discovery Miles 11 720 Ships in 18 - 22 working days
Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback): Parisa Dr. Naraei,... Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback)
Parisa Dr. Naraei, I.S. Dr. Amiri, Iman Dr. Saberi
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.

Next Generation Wireless Network Security and Privacy (Hardcover): Kamaljit I Lakhtaria Next Generation Wireless Network Security and Privacy (Hardcover)
Kamaljit I Lakhtaria
R5,129 Discovery Miles 51 290 Ships in 18 - 22 working days

As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.

Safety and Security Issues in Technical Infrastructures (Hardcover): David Rehak, Ales Bernatik, Zdenek Dvorak, Martin Hromada Safety and Security Issues in Technical Infrastructures (Hardcover)
David Rehak, Ales Bernatik, Zdenek Dvorak, Martin Hromada
R5,490 Discovery Miles 54 900 Ships in 18 - 22 working days

In the modern age of urbanisation, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral services to the general public including the delivery of energy, information and communication technologies, and maintenance of transport networks. The safety and security of these structures is crucial as new threats are continually emerging. Safety and Security Issues in Technical Infrastructures is a pivotal reference source that provides vital research on the modernisation of occupational security and safety practices within information technology-driven buildings. While highlighting topics such as explosion process safety, nanotechnology, and infrastructural risk analysis, this publication explores current risks and uncertainties and the raising of comprehensive awareness for experts in this field. This book is ideally designed for security managers, safety personnel, civil engineers, architects, researchers, construction professionals, strategists, educators, material scientists, property owners, and students.

Cyberspace (Hardcover): Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid Cyberspace (Hardcover)
Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid
R3,079 Discovery Miles 30 790 Ships in 18 - 22 working days
AWS Migration Hub User Guide (Hardcover): Documentation Team AWS Migration Hub User Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Surveillance and Threat Detection - Prevention versus Mitigation (Hardcover, New): Richard Kirchner Surveillance and Threat Detection - Prevention versus Mitigation (Hardcover, New)
Richard Kirchner
R1,371 Discovery Miles 13 710 Ships in 10 - 15 working days

"Surveillance and Threat Detection" offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs.

Readers of "Surveillance and Threat Detection" will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.
Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attackUnderstand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection programAccess a full ancillary package, including instructor's manual, test banks, and student study exams

Social Theory After the Internet (Hardcover): Ralph Schroeder Social Theory After the Internet (Hardcover)
Ralph Schroeder
R1,124 Discovery Miles 11 240 Ships in 10 - 15 working days
Amazon EC2 Auto Scaling User Guide (Hardcover): Documentation Team Amazon EC2 Auto Scaling User Guide (Hardcover)
Documentation Team
R1,162 Discovery Miles 11 620 Ships in 18 - 22 working days
AWS Schema Conversion Tool User Guide (Hardcover): Documentation Team AWS Schema Conversion Tool User Guide (Hardcover)
Documentation Team
R1,732 Discovery Miles 17 320 Ships in 18 - 22 working days
Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New): Josh More Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New)
Josh More
R618 Discovery Miles 6 180 Ships in 10 - 15 working days

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. "

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game "explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job.

This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context.

The emphasis in "Job Reconnaissance "is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search bookscommonly miss.
Covers the entire job hunt process from when to decide to leave your current job to the departure of your current jobSuggests how to research new possible job opportunitiesShows how to target your new boss, controlling the job interview process and negotiating your new compensation "

Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security... Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls (Paperback)
Tom Piens
R1,221 Discovery Miles 12 210 Ships in 18 - 22 working days

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

AWS Systems Manager User Guide (Hardcover): Documentation Team AWS Systems Manager User Guide (Hardcover)
Documentation Team
R2,278 Discovery Miles 22 780 Ships in 18 - 22 working days
Research Anthology on Combating Denial-of-Service Attacks (Hardcover): Information Resources Management Association Research Anthology on Combating Denial-of-Service Attacks (Hardcover)
Information Resources Management Association
R9,949 Discovery Miles 99 490 Ships in 18 - 22 working days

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers. Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Network and System Security (Paperback, 2nd edition): John Vacca Network and System Security (Paperback, 2nd edition)
John Vacca
R1,289 Discovery Miles 12 890 Ships in 10 - 15 working days

"Network and System Security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhereComprehensive and updated coverage of the subject area allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,090 Discovery Miles 90 900 Ships in 18 - 22 working days
Handbook of Research on Security Considerations in Cloud Computing (Hardcover): Kashif Munir, Mubarak S. Al-Mutairi, Lawan A.... Handbook of Research on Security Considerations in Cloud Computing (Hardcover)
Kashif Munir, Mubarak S. Al-Mutairi, Lawan A. Mohammed
R8,080 Discovery Miles 80 800 Ships in 18 - 22 working days

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Deep Learning AMI Developer Guide (Hardcover): Documentation Team Deep Learning AMI Developer Guide (Hardcover)
Documentation Team
R1,181 Discovery Miles 11 810 Ships in 18 - 22 working days
Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback): Michael Cross Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback)
Michael Cross
R1,118 Discovery Miles 11 180 Ships in 10 - 15 working days

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
Defines an organization's goals for social networkingPresents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security"

AWS Elemental MediaConvert User Guide (Hardcover): Documentation Team AWS Elemental MediaConvert User Guide (Hardcover)
Documentation Team
R895 Discovery Miles 8 950 Ships in 18 - 22 working days
Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,085 Discovery Miles 90 850 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Python Machine Learning - A Practical…
Brandon Railey Hardcover R685 R614 Discovery Miles 6 140
Dennis Brutus - The South African Years
Tyrone August Paperback R185 R171 Discovery Miles 1 710
Diagnosis, Evaluation, and Treatment of…
Sam Chang Hardcover R1,721 Discovery Miles 17 210
FORTRAN 90 for Scientists and Engineers
Brian Hahn Paperback R1,359 Discovery Miles 13 590
Design and Development of Affordable…
Arindam Bit Hardcover R6,105 Discovery Miles 61 050
Research Anthology on Recent Trends…
Information Reso Management Association Hardcover R9,789 Discovery Miles 97 890
Basic DCC Wiring for Your Model Railroad…
Mike Polsgrove Paperback R353 R327 Discovery Miles 3 270
Pearson Edexcel AS and A level Further…
Paperback  (1)
R959 Discovery Miles 9 590
Annual Report
Boston and Maine railroad Hardcover R737 Discovery Miles 7 370
Individual Participant Data…
R. D. Riley Hardcover R2,031 Discovery Miles 20 310

 

Partners