0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (321)
  • R250 - R500 (914)
  • R500+ (16,245)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover)
James Aweya
R8,792 Discovery Miles 87 920 Ships in 12 - 17 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security... Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls (Paperback)
Tom Piens
R1,303 Discovery Miles 13 030 Ships in 10 - 15 working days

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

Privacy and Legal Issues in Cloud Computing (Paperback): Anne S.Y. Cheung, Rolf H. Weber Privacy and Legal Issues in Cloud Computing (Paperback)
Anne S.Y. Cheung, Rolf H. Weber
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

Using a multi-disciplinary and comparative approach, this study examines emerging and innovative attempts to tackle privacy and legal issues in cloud computing such as personal data privacy, security and intellectual property protection. An international team of legal scholars, computer science researchers, regulators and practitioners present original and critical responses to the growing challenges posed by cloud computing. They analyze the specific legal implications pertaining to jurisdiction, biomedical practice and information ownership, as well as issues of regulatory control, competition and cross-border regulation. Law academics, practitioners and regulators will find this book to be a valuable, practical and accessible resource, as will computer science scholars interested in cloud computing issues. Contributors: H. Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y. Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny, C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu

Kali Linux Penetration Testing Bible (Paperback): G Khawaja Kali Linux Penetration Testing Bible (Paperback)
G Khawaja
R749 Discovery Miles 7 490 Ships in 12 - 17 working days

Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali's varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You'll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether you're new to the field or an established pentester, you'll find what you need in this comprehensive guide. Build a modern dockerized environment Discover the fundamentals of the bash language in Linux Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more) Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation Apply practical and efficient pentesting workflows Learn about Modern Web Application Security Secure SDLC Automate your penetration testing with Python

CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,347 Discovery Miles 13 470 Ships in 12 - 17 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Paperback): Ric Messier CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Paperback)
Ric Messier
R1,352 Discovery Miles 13 520 Ships in 12 - 17 working days

The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you’ll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide. The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You’ll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.

Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition): R. Anderson Security Engineering - A Guide to Building Dependable Distributed Systems, Third Edition (Hardcover, 3rd Edition)
R. Anderson
R1,358 Discovery Miles 13 580 Ships in 12 - 17 working days

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than on technology. The book repeated its success by showing how security engineers can focus on usability. Now the third edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of Things Who the attackers are - from nation states and business competitors through criminal gangs to stalkers and playground bullies What they do - from phishing and carding through SIM swapping and software exploits to DDoS and fake news Security psychology, from privacy through ease-of-use to deception The economics of security and dependability - why companies build vulnerable systems and governments look the other way How dozens of industries went online - well or badly How to manage security and safety engineering in a world of agile development - from reliability engineering to DevSecOps The third edition of Security Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?

What Is Cybersecurity For? (Paperback): Tim Stevens What Is Cybersecurity For? (Paperback)
Tim Stevens
R272 Discovery Miles 2 720 Ships in 12 - 17 working days

How will protecting our digital infrastructure shape our future? Cybersecurity is one of the key practical and political challenges of our time. It is at the heart of how modern societies survive and thrive, yet public understanding is still rudimentary: media portrayals of hoodie-wearing hackers accessing the Pentagon don't convey its complexity or significance to contemporary life. This book addresses this gap, showing that the political dimension is as important as the technological one. It accessibly explains the complexities of global information systems, the challenges of providing security to users, societies, states and the international system, and the multitude of competing players and ambitions in this arena. Making the case for understanding it not only as a technical project, but as a crucial political one that links competing visions of what cybersecurity is for, it tackles the ultimate question: how can we do it better?

Data Visualization with Excel Dashboards and Reports (Paperback): D Kusleika Data Visualization with Excel Dashboards and Reports (Paperback)
D Kusleika
R769 Discovery Miles 7 690 Ships in 12 - 17 working days

Large corporations like IBM and Oracle are using Excel dashboards and reports as a Business Intelligence tool, and many other smaller businesses are looking to these tools in order to cut costs for budgetary reasons. An effective analyst not only has to have the technical skills to use Excel in a productive manner but must be able to synthesize data into a story, and then present that story in the most impactful way. Microsoft shows its recognition of this with Excel. In Excel, there is a major focus on business intelligence and visualization. Data Visualization with Excel Dashboards and Reports fills the gap between handling data and synthesizing data into meaningful reports. This title will show readers how to think about their data in ways other than columns and rows. Most Excel books do a nice job discussing the individual functions and tools that can be used to create an "Excel Report". Titles on Excel charts, Excel pivot tables, and other books that focus on "Tips and Tricks" are useful in their own right; however they don't hit the mark for most data analysts. The primary reason these titles miss the mark is they are too focused on the mechanical aspects of building a chart, creating a pivot table, or other functionality. They don't offer these topics in the broader picture by showing how to present and report data in the most effective way. What are the most meaningful ways to show trending? How do you show relationships in data? When is showing variances more valuable than showing actual data values? How do you deal with outliers? How do you bucket data in the most meaningful way? How do you show impossible amounts of data without inundating your audience? In Data Visualization with Excel Reports and Dashboards, readers will get answers to all of these questions. Part technical manual, part analytical guidebook; this title will help Excel users go from reporting data with simple tables full of dull numbers, to creating hi-impact reports and dashboards that will wow management both visually and substantively. This book offers a comprehensive review of a wide array of technical and analytical concepts that will help users create meaningful reports and dashboards. After reading this book, the reader will be able to: Analyze large amounts of data and report their data in a meaningful way Get better visibility into data from different perspectives Quickly slice data into various views on the fly Automate redundant reporting and analyses Create impressive dashboards and What-If analyses Understand the fundamentals of effective visualization Visualize performance comparisons Visualize changes and trends over time

The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback): PL Wylie The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback)
PL Wylie
R566 Discovery Miles 5 660 Ships in 12 - 17 working days

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Technology for Success - Computer Concepts (Paperback, New edition): Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell,... Technology for Success - Computer Concepts (Paperback, New edition)
Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell, Mark Frydenberg, … 1
R1,214 R1,091 Discovery Miles 10 910 Save R123 (10%) Ships in 10 - 15 working days

Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.

Smart Buildings Digitalization, Two Volume Set (Hardcover): O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban Smart Buildings Digitalization, Two Volume Set (Hardcover)
O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban
R6,325 Discovery Miles 63 250 Ships in 12 - 17 working days

A smart building is the state-of-art in building with features that facilitates informed decision making based on the available data through smart metering and IoT sensors. This set provides useful information for developing smart buildings including significant improvement of energy efficiency, implementation of operational improvements and targeting sustainable environment to create an effective customer experience. It includes case studies from industrial results which provide cost effective solutions and integrates the digital SCADE solution. Describes complete implication of smart buildings via industrial, commercial and community platforms Systematically defines energy-efficient buildings, employing power consumption optimization techniques with inclusion of renewable energy sources Covers data centre and cyber security with excellent data storage features for smart buildings Includes systematic and detailed strategies for building air conditioning and lighting Details smart building security propulsion. This set is aimed at graduate students, researchers and professionals in building systems, architectural, and electrical engineering.

(ISC)2 CISSP Certified Information Systems Securit y Professional Official Study Guide & Practice Tes ts Bundle, 3rd Edition... (ISC)2 CISSP Certified Information Systems Securit y Professional Official Study Guide & Practice Tes ts Bundle, 3rd Edition (Paperback, 3rd Edition)
M. Chapple
R1,793 Discovery Miles 17 930 Ships in 12 - 17 working days

Two bestselling CISSP guides in one serious study set This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC)(2) CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition with an updated and refined collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam. (ISC)(2) CISSP Study Guide, 9th Edition has been completely updated for the latest 2021 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes four practice exams each with 125 unique questions to help you identify where you need to study more, more than 1000 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam, a searchable glossary in PDF to give you instant access to the key terms you need to know for the exam. Add to that the updated (ISC)(2) CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd edition with 4 more complete 125-question exams and another 100 questions for each of the 8 domains and you'll be as ready as you can be for the CISSP exam. All of the practice questions from both books have been vetted again for 2021 by multiple CISSPs and instructors, retaining only the best questions from previous editions insuring that the questions you practice with give you the best possible preparation. Coverage of all of the exam topics in each book means you'll be ready for: Security and Risk Management Asset Security Security Architecture and Engineering Communication and Network Security Identity and Access Management (IAM) Security Assessment and Testing Security Operations Software Development Security

CCNA 200-301 Network Simulator (Digital product license key): Sean Wilkins CCNA 200-301 Network Simulator (Digital product license key)
Sean Wilkins
R3,025 Discovery Miles 30 250 Ships in 12 - 17 working days

CCNA Interactive Learning: More than 300 labs More than 4,000 hands-on tasks Four Kinds of Labs: Skill Builders Subnetting Exercises Configuration Scenarios Troubleshooting Scenarios The CCNA 200-301 Network Simulator is a single-user software package. It helps you develop and improve hands-on configuration and troubleshooting skills without the investment in expensive lab hardware. This state-of-the-art, interactive simulation software enables you to practice your networking skills with more than 300 structured labs designed to help you learn by doing, the most effective method of learning. Experience realistic network device responses as you perform each lab, which include detailed instructions, topology diagrams, critical-thinking questions, hints, and answers. Working through the labs, you will quickly become proficient with all the common Cisco IOS version 15 router and switch commands on the CCNA exam. Unlike other simulators on the market, the lab scenarios included in the CCNA 200-301 Network Simulator are far more complex, challenging you to learn how to perform real-world network configuration and troubleshooting tasks. Master the hands-on skills needed to succeed on the CCNA exam, including: Network fundamentals Network access IP connectivity IP services Security fundamentals IP Subnetting Skill Builders: These 175+ labs are narrowly focused, enabling you to practice your configuration skills on a single topic. Coverage includes: Interface settings and status Router and Switch CLI Exec Mode and config process Telnet, Ping, Traceroute, and terminal history Switch IP address, connectivity, and forwarding PC IP commands Configuring IP addresses Subnet Zero IP addressing and IPv6 address configuration CDP and LLDP VLANs and Trunking Router-on-a-stick STP and MLS Static and Dynamic EtherChannel Wireless LAN Controllers Connected, static, and default routes OSPF SSH NAT NTP Router and switch security fundamentals ACL CHCP Dynamic ARP Port security IOS backup Subnetting Exercises: These 80 labs help you to perform subnetting calculations quickly and accurately, a critical skill for success on the CCNA exam. Topics covered include: IPv4 and IPv6 subnet ID calculation IP address rejection IP route selection VLSM overlaps IPv6 EUI-64 calculation Selecting VLSM routes Configuration Scenarios: These 40+ labs are more broadly focused, combining multiple technologies into configuration scenarios that mimic real-world environments. These labs are longer and more complex,challenging you to put your configuration skills to the test. Topics covered include: IP and MAC comparisons Switch IP connectivity and security Subnetting and addressing IP addressing and configuration IPv6 configuraiton Switch interfaces and forwarding VLAN trunking STP analysis, configuration, and prediction Wireless LAN Controllers Static routing Configuring default routes OSPF Router-on-a-stick to MLS SSH and Telnet NAT ACL Password recovery Rebuilding a configuration Troubleshooting Scenarios: These 18 labs present typical troubleshooting scenarios and require you to explore the misconfigured network, isolate the issues, and correct the problems. These are very complicated and realistic scenarios that truly test your ability to perform the job of a network engineer. Topics covered include: Switch forwarding Path analysis and troubleshooting IPv4/IPv6 addressing IP routing OSPF VLAN troubleshooting STP Network discovery Port security System requirements: Operating Systems: Windows 10 (32/64 bit) Windows 8.1 (32/64 bit) Mac OS 10.15 (Catalina) Mac OS 10.14 (Mojave) Mac OS 10.13 (High Sierra) Free Storage Space: 1 GB (minimum) System memory (RAM): 4 GB (minimum) Processor: i3 3.4 GHz (minimum) and above Software Pre-requisites: Node JS 10 PDF reader Monitor resolution: Minimum resolution: 1024 X 768 Best viewed: 1280 X 800 and above Internet speed: 2 Mbps (minimum) is needed only during software activation, reporting feedback and receiving updates. After activation, Internet is not needed for accessing the labs in the application. Language: English (US)

If It's Smart, It's Vulnerable (Hardcover): M Hypponen If It's Smart, It's Vulnerable (Hardcover)
M Hypponen
R537 Discovery Miles 5 370 Ships in 12 - 17 working days

Reimagine the future of the internet All our devices and gadgets--from our refrigerators to our home security systems, vacuum cleaners, and stereos--are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best--and worst--things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. Readers will also find: Insightful discussions of how law enforcement and intelligence agencies operate on the internet Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology Explorations of how the internet has changed the world, for better and for worse Engaging stories from Mikko's 30-year career in infosec Perfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It's Smart, It's Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.

Bootstrapped Millionaire - Defying the Odds of Business (Hardcover): Tim T Mercer Bootstrapped Millionaire - Defying the Odds of Business (Hardcover)
Tim T Mercer
R809 R670 Discovery Miles 6 700 Save R139 (17%) Ships in 10 - 15 working days
CISSP Passport (Paperback): Bobby Rogers CISSP Passport (Paperback)
Bobby Rogers
R622 Discovery Miles 6 220 Ships in 12 - 17 working days

This quick review study guide offers 100% coverage of every topic on the latest version of the CISSP exam This powerful exam preparation resource presents an accelerated review of all objectives for the 2021 release of the challenging Certified Information Systems Security Professional exam. Written in the proven Passport format, the book enables you to focus on specific topics, determine areas of need, and tailor an effective course for study. CISSP Passport enables you to tailor your studies and drill down into the exam's objectives. The book features special elements that highlight actual exam topics, define need-to-know terms, point out potential exam pitfalls, and list additional resources for further information. Each chapter includes a review section that provides bulleted summations by exam objective as well as practice exam questions with in-depth answer explanations. * Provides complete coverage of every objective on the CISSP exam * Online content includes 200 practice questions in the customizable TotalTester exam engine * Written by a seasoned cybersecurity expert

Data Localization Laws and Policy - The EU Data Protection International Transfers Restriction Through a Cloud Computing Lens... Data Localization Laws and Policy - The EU Data Protection International Transfers Restriction Through a Cloud Computing Lens (Hardcover)
W. Kuan Hon
R4,422 Discovery Miles 44 220 Ships in 12 - 17 working days

Countries are increasingly introducing data localization laws and data export restrictions, threatening digital globalization and inhibiting cloud computing's adoption despite its acknowledged benefits. Through a cloud computing lens, this multi-disciplinary book examines the personal data transfers restriction under the EU Data Protection Directive (including the EUUS Privacy Shield and General Data Protection Regulation). It covers historical objectives and practical problems, showing why the focus should move from physical data location to effective jurisdiction over those controlling access to intelligible data and control of access to data through security measures. The book further discusses data localization laws' failure to solve concerns regarding the topical and contentious issue of mass state surveillance. Its arguments are also relevant to other data localization laws, cross-border transfers of non personal data and transfers not involving cloud computing. Comprehensive yet accessible, this book is of great value to academics in law, policy, computer science and technology. It is also highly relevant to cloud computing/technology organisations and other businesses in the EU and beyond, data privacy professionals, policymakers and regulators.

(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Third Edition (Paperback, 3rd Edition): M. Chapple (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Third Edition (Paperback, 3rd Edition)
M. Chapple
R811 Discovery Miles 8 110 Ships in 12 - 17 working days

The only official CCSP practice test product endorsed by (ISC)2 With over 850 practice questions all new for the 2022-2025 exam objectives, (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 3rd Edition gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by domain allows you to practice only the areas you need to bring you up to par, without wasting precious time on topics you've already mastered. As the only official practice test product for the CCSP exam endorsed by (ISC)2, this essential resource is your best bet for gaining a thorough understanding of the topic. It also illustrates the relative importance of each domain, helping you plan your remaining study time so you can go into the exam fully confident in your knowledge. When you're ready, two practice exams allow you to simulate the exam day experience and apply your own test-taking strategies with domains given in proportion to the real thing. The online learning environment and practice exams are the perfect way to prepare and make your progress easy to track. For this new Third Edition, cloud security experts Mike Chapple and David Seidl have delivered an all-new question set for the new CCSP 2022-2025 objectives. These authors are well known for their best-selling (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests and now they've joined forces again to deliver the same high caliber practice questions for the CCSP exam.

Hacking For Dummies, 7th Edition (Paperback, 7th Edition): K Beaver Hacking For Dummies, 7th Edition (Paperback, 7th Edition)
K Beaver
R555 Discovery Miles 5 550 Ships in 12 - 17 working days

Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to "penetration test" your network's security Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.

Age Of Agency - Rise With A.I. (Paperback): Kerushan Govender Age Of Agency - Rise With A.I. (Paperback)
Kerushan Govender
R350 R280 Discovery Miles 2 800 Save R70 (20%) Ships in 5 - 10 working days

Do you feel overwhelmed by the AI wave? Worried that it could cost you your job, harm your business, or even take over? AI has pervaded our lives and is aggressively disrupting business. No person today can afford to ignore AI.

Age of Agency is your companion, helping you leverage AI's capabilities to power your productivity and success. By understanding AI, you will learn to use it as a tool for personal career growth and business success.

Former Microsoft executive Kerushan Govender demystifies AI, emphasising the importance of human agency. Reconnect with the needs of humanity and learn the importance of care as a differentiator in an AI world. Avoid the potential pitfalls of excessive reliance on the technology.

Age of Agency is a blueprint for ensuring human agency outpaces computer agency. It boldly pits the limits of machine learning against the infinity of human ability. With this survival guide, you’ll uncover ways to connect with humanity on a deeper level, going beyond anything AI can do.

Ready to become AI-savvy, with your humanity as your differentiator? Dive into the future with the confidence to ride the wave of today’s AI revolution.

Mastering VMware NSX for vSphere (Paperback): ES Sena Sosa Mastering VMware NSX for vSphere (Paperback)
ES Sena Sosa
R1,057 Discovery Miles 10 570 Ships in 12 - 17 working days

A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.

People-Centric Skills - Interpersonal and Communication Skills for Financial Professionals (Paperback, 2nd Edition): Danny M.... People-Centric Skills - Interpersonal and Communication Skills for Financial Professionals (Paperback, 2nd Edition)
Danny M. Goldberg
R443 Discovery Miles 4 430 Ships in 12 - 17 working days

Use your interpersonal and communication skills as a financial professional to work successfully with clients Embark on a journey to further develop your career when you read People-Centric Skills Interpersonal and Communication Skills for Financial Professionals, 2nd Edition. Business leaders consider employee communication skills and critical thinking abilities as essential elements for success. In their work, all professionals must communicate clearly and rely on their interpersonal skills to be successful. This second edition of People-Centric Skills shares the fictional story of Dalton Zimmer, executive coach and public speaker. Dalton, all the while juggling his business, kids and social life, provides coaching and communication strategies for handling challenging situations faced by his clients. This insightful narrative will help you expand communication and soft skills as a CPA, auditor, financial planner or other financial professional. As Generation Z is entering the work force, the communication gap between Z and Boomers or Generation X is widening significantly. New to the second edition, you'll find a discussion of communication between generations and how to bridge them as a financial professional. You can be a more people-centric leader as you engage with a wide range of clients and associates. This book can be a first step to improving interpersonal and communication skills as you continue to develop in your career.

CompTIA A+ Complete Study Guide: Core 1 Exam 220-1 101 and Core 2 Exam 220-1102 5th Edition (Paperback, 5th Edition): Q Docter CompTIA A+ Complete Study Guide: Core 1 Exam 220-1 101 and Core 2 Exam 220-1102 5th Edition (Paperback, 5th Edition)
Q Docter
R1,220 Discovery Miles 12 200 Ships in 12 - 17 working days

The Fifth Edition of the CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 offers accessible and essential test preparation material for the popular A+ certification. Providing full coverage of all A+ exam objectives and competencies covered on the latest Core 1 and Core 2 exams, the book ensures you'll have the skills and knowledge to confidently succeed on the test and in the field as a new or early-career computer technician. The book presents material on mobile devices, hardware, networking, virtualization and cloud computing, network, hardware, and software troubleshooting, operating systems, security, and operational procedures. Comprehensive discussions of all areas covered by the exams will give you a head start as you begin your career as a computer technician. This new edition also offers: Accessible and easy-to-follow organization perfect to prepare you for one of the most popular certification exams on the market today Opportunities to practice skills that are in extraordinary demand in the IT industry Access to the Sybex online test bank, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone prepping for the Core 1 and Core 2 A+ exams, CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is a must-have resource for new and early-career computer technicians seeking to improve their skills and increase their efficacy in the field.

The Big Book of Drones (Paperback): Ralph DeFrangesco, Stephanie DeFrangesco The Big Book of Drones (Paperback)
Ralph DeFrangesco, Stephanie DeFrangesco
R879 Discovery Miles 8 790 Ships in 9 - 15 working days

Drones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist. For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down. Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Acquiring Card Payments
Ilya Dubinsky Paperback R1,359 Discovery Miles 13 590
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,949 Discovery Miles 29 490
CISM Certified Information Security…
Peter Gregory Paperback R1,014 Discovery Miles 10 140
How I Rob Banks - And Other Such Places
F. C. Barker Hardcover R458 Discovery Miles 4 580
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,331 R1,194 Discovery Miles 11 940
Guide to Networking Essentials
Greg Tomsho Paperback R1,364 R1,222 Discovery Miles 12 220
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R635 Discovery Miles 6 350
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850

 

Partners