0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (256)
  • R250 - R500 (864)
  • R500+ (13,657)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Securing VoIP - Keeping Your VoIP Network Safe (Paperback): Regis J. Jr (Bud) Bates Securing VoIP - Keeping Your VoIP Network Safe (Paperback)
Regis J. Jr (Bud) Bates
R1,030 Discovery Miles 10 300 Ships in 10 - 15 working days

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

AWS Step Functions Developer Guide (Hardcover): Documentation Team AWS Step Functions Developer Guide (Hardcover)
Documentation Team
R1,156 Discovery Miles 11 560 Ships in 18 - 22 working days
Cloud Computing (Hardcover): Sam Revere Cloud Computing (Hardcover)
Sam Revere
R3,029 R2,745 Discovery Miles 27 450 Save R284 (9%) Ships in 18 - 22 working days
AWS Organizations User Guide (Hardcover): Documentation Team AWS Organizations User Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Internet of Things (Hardcover): Fausto Pedro Garcia Marquez Internet of Things (Hardcover)
Fausto Pedro Garcia Marquez
R3,053 Discovery Miles 30 530 Ships in 18 - 22 working days
Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover)
Information R Management Association
R13,766 Discovery Miles 137 660 Ships in 18 - 22 working days
Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback): Babak Akhgar,... Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback)
Babak Akhgar, Gregory B Saathoff, Hamid R Arabnia, Richard Hill, Andrew Staniforth, …
R1,382 Discovery Miles 13 820 Ships in 10 - 15 working days

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security

Safety and Security Issues in Technical Infrastructures (Hardcover): David Rehak, Ales Bernatik, Zdenek Dvorak, Martin Hromada Safety and Security Issues in Technical Infrastructures (Hardcover)
David Rehak, Ales Bernatik, Zdenek Dvorak, Martin Hromada
R5,490 Discovery Miles 54 900 Ships in 18 - 22 working days

In the modern age of urbanisation, the mass population is becoming progressively reliant on technical infrastructures. These industrial buildings provide integral services to the general public including the delivery of energy, information and communication technologies, and maintenance of transport networks. The safety and security of these structures is crucial as new threats are continually emerging. Safety and Security Issues in Technical Infrastructures is a pivotal reference source that provides vital research on the modernisation of occupational security and safety practices within information technology-driven buildings. While highlighting topics such as explosion process safety, nanotechnology, and infrastructural risk analysis, this publication explores current risks and uncertainties and the raising of comprehensive awareness for experts in this field. This book is ideally designed for security managers, safety personnel, civil engineers, architects, researchers, construction professionals, strategists, educators, material scientists, property owners, and students.

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 2 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,090 Discovery Miles 90 900 Ships in 18 - 22 working days
Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,327 Discovery Miles 103 270 Ships in 18 - 22 working days
TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R893 R812 Discovery Miles 8 120 Save R81 (9%) Ships in 18 - 22 working days
Cyberspace (Hardcover): Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid Cyberspace (Hardcover)
Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid
R3,079 Discovery Miles 30 790 Ships in 18 - 22 working days
Amazon Polly Developer Guide (Hardcover): Documentation Team Amazon Polly Developer Guide (Hardcover)
Documentation Team
R1,172 Discovery Miles 11 720 Ships in 18 - 22 working days
Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback): Parisa Dr. Naraei,... Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback)
Parisa Dr. Naraei, I.S. Dr. Amiri, Iman Dr. Saberi
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.

Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence (Hardcover): Romil Rawat, Vinod Mahor, Shrikant... Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence (Hardcover)
Romil Rawat, Vinod Mahor, Shrikant Telang; Kiran Pachlasiya
R6,208 Discovery Miles 62 080 Ships in 18 - 22 working days

Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.

Google Drive & Docs In 30 Minutes - The unofficial guide to Google Drive, Docs, Sheets & Slides (Hardcover, 3rd Revised and... Google Drive & Docs In 30 Minutes - The unofficial guide to Google Drive, Docs, Sheets & Slides (Hardcover, 3rd Revised and Updated ed.)
Ian Lamont
R583 Discovery Miles 5 830 Ships in 10 - 15 working days
Selfies as a Mode of Social Media and Work Space Research (Hardcover): Shalin Hai-Jew Selfies as a Mode of Social Media and Work Space Research (Hardcover)
Shalin Hai-Jew
R4,595 Discovery Miles 45 950 Ships in 18 - 22 working days

The Western cultural trend of self-representation is transcending borders as it permeates the online world. A prime example of this trend is selfies, and how they have evolved into more than just self-portraits. Selfies as a Mode of Social Media and Work Space Research is a comprehensive reference source for the latest research on explicit and implicit messaging of self-portraiture and its indications about individuals, groups, and societies. Featuring coverage on a broad range of topics including dating, job hunting, and marketing, this publication is ideally designed for academicians, researchers, and professionals interested in the current phenomenon of selfies and their impact on society.

AWS Schema Conversion Tool User Guide (Hardcover): Documentation Team AWS Schema Conversion Tool User Guide (Hardcover)
Documentation Team
R1,732 Discovery Miles 17 320 Ships in 18 - 22 working days
AWS Migration Hub User Guide (Hardcover): Documentation Team AWS Migration Hub User Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Surveillance and Threat Detection - Prevention versus Mitigation (Hardcover, New): Richard Kirchner Surveillance and Threat Detection - Prevention versus Mitigation (Hardcover, New)
Richard Kirchner
R1,371 Discovery Miles 13 710 Ships in 10 - 15 working days

"Surveillance and Threat Detection" offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs.

Readers of "Surveillance and Threat Detection" will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.
Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attackUnderstand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection programAccess a full ancillary package, including instructor's manual, test banks, and student study exams

Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New): Josh More Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New)
Josh More
R618 Discovery Miles 6 180 Ships in 10 - 15 working days

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. "

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game "explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job.

This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context.

The emphasis in "Job Reconnaissance "is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search bookscommonly miss.
Covers the entire job hunt process from when to decide to leave your current job to the departure of your current jobSuggests how to research new possible job opportunitiesShows how to target your new boss, controlling the job interview process and negotiating your new compensation "

Social Theory After the Internet (Hardcover): Ralph Schroeder Social Theory After the Internet (Hardcover)
Ralph Schroeder
R1,124 Discovery Miles 11 240 Ships in 10 - 15 working days
Amazon EC2 Auto Scaling User Guide (Hardcover): Documentation Team Amazon EC2 Auto Scaling User Guide (Hardcover)
Documentation Team
R1,162 Discovery Miles 11 620 Ships in 18 - 22 working days
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New): Danda B. Rawat, Bhed... Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New)
Danda B. Rawat, Bhed B. Bista, Gongjun Yan
R5,051 Discovery Miles 50 510 Ships in 18 - 22 working days

While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.

Network and System Security (Paperback, 2nd edition): John Vacca Network and System Security (Paperback, 2nd edition)
John Vacca
R1,289 Discovery Miles 12 890 Ships in 10 - 15 working days

"Network and System Security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhereComprehensive and updated coverage of the subject area allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Conflict, Cultural Heritage and Peace…
Colin Breen Hardcover R4,479 Discovery Miles 44 790
Locating Imagination in Popular Culture…
Nicky van Es, Stijn Reijnders, … Paperback R1,385 Discovery Miles 13 850
Transboundary Heritage and Intellectual…
Patricia Covarrubia Hardcover R4,076 Discovery Miles 40 760
The Sustainable Museum - How Museums…
Christopher J. Garthe Paperback R1,111 Discovery Miles 11 110
Museums, Art and Inclusion in a Climate…
Janice Baker Hardcover R4,478 Discovery Miles 44 780
Documentation as Art - Expanded Digital…
Annet Dekker, Gabriella Giannachi Hardcover R4,072 Discovery Miles 40 720
The Sustainable Museum - How Museums…
Christopher J. Garthe Hardcover R4,078 Discovery Miles 40 780
Heritage Revitalisation for Tourism in…
Chris White Paperback R800 Discovery Miles 8 000
A Theory of Cultural Heritage - Beyond…
Salvador Munoz Vinas Hardcover R4,483 Discovery Miles 44 830
The Arts and Humanities on Environmental…
Sarah Sutton Hardcover R4,059 Discovery Miles 40 590

 

Partners