0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (273)
  • R250 - R500 (876)
  • R500+ (13,596)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Network and System Security (Paperback, 2nd edition): John Vacca Network and System Security (Paperback, 2nd edition)
John Vacca
R1,289 Discovery Miles 12 890 Ships in 10 - 15 working days

"Network and System Security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhereComprehensive and updated coverage of the subject area allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover):... Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics, VOL 1 (Hardcover)
D.B.A., Mehdi Khosrow-Pour,
R9,085 Discovery Miles 90 850 Ships in 18 - 22 working days
Handbook of Research on Security Considerations in Cloud Computing (Hardcover): Kashif Munir, Mubarak S. Al-Mutairi, Lawan A.... Handbook of Research on Security Considerations in Cloud Computing (Hardcover)
Kashif Munir, Mubarak S. Al-Mutairi, Lawan A. Mohammed
R8,080 Discovery Miles 80 800 Ships in 18 - 22 working days

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Deep Learning AMI Developer Guide (Hardcover): Documentation Team Deep Learning AMI Developer Guide (Hardcover)
Documentation Team
R1,181 Discovery Miles 11 810 Ships in 18 - 22 working days
AWS Elemental MediaConvert User Guide (Hardcover): Documentation Team AWS Elemental MediaConvert User Guide (Hardcover)
Documentation Team
R895 Discovery Miles 8 950 Ships in 18 - 22 working days
Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New):... Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New)
Michael T. Raggo, Chet Hosmer
R1,103 Discovery Miles 11 030 Ships in 10 - 15 working days

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. "Data Hiding "provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7Dives deep into the less known approaches to data hiding, covert communications, and advanced malwareIncludes never before published information about next generation methods of data hidingOutlines a well-defined methodology for countering threatsLooks ahead at future predictions fordata hiding"

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An... Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data - An Excerpt from Malware Forensic Field Guide for Linux Systems (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R432 Discovery Miles 4 320 Ships in 10 - 15 working days

"Linux Malware Incident Response" is a "first look" at the "Malware Forensics Field Guide for Linux Systems," exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
Presented in a succinct outline format with cross-references to included supplemental components and appendicesCovers volatile data collection methodology as well as non-volatile data collection from a live Linux systemAddresses malware artifact discovery and extraction from a live Linux system

Developments in Wireless Network Prototyping, Design, and Deployment - Future Generations (Hardcover): Mohammad A. Matin Developments in Wireless Network Prototyping, Design, and Deployment - Future Generations (Hardcover)
Mohammad A. Matin
R4,825 Discovery Miles 48 250 Ships in 18 - 22 working days

Wireless networks have become essential for delivering content and knowledge in the information age. Ever-increasing demands are made on these infrastructures as more and more sophisticated knowledge is consumed worldwide. Developments in Wireless Network Prototyping, Design, and Deployment: Future Generations highlights the current design issues in wireless networks, informing scholars and practitioners about advanced prototyping innovations in this field. This book will empower readers to make further advancements in networking and serves as a comprehensive reference for graduate students, scholars, and practitioners alike.

Practical Anonymity - Hiding in Plain Sight Online (Paperback): Pete Loshin Practical Anonymity - Hiding in Plain Sight Online (Paperback)
Pete Loshin
R622 Discovery Miles 6 220 Ships in 10 - 15 working days

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing. "

Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New): Josh More Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New)
Josh More
R608 Discovery Miles 6 080 Ships in 10 - 15 working days

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. "

Assessing Vendors "shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price

Age of Agency - Rise with AI (Paperback, 1st Edition): Kerushan Govender Age of Agency - Rise with AI (Paperback, 1st Edition)
Kerushan Govender
R750 R637 Discovery Miles 6 370 Save R113 (15%) Ships in 5 - 10 working days

Do you feel overwhelmed by the AI wave? Worried that it could cost you your job, harm your business, or even take over? AI has pervaded our lives and is aggressively disrupting business. No person today can afford to ignore AI.

Age of Agency is your companion, helping you leverage AI's capabilities to power your productivity and success. By understanding AI, you will learn to use it as a tool for personal career growth and business success.

Former Microsoft executive Kerushan Govender demystifies AI, emphasising the importance of human agency. Reconnect with the needs of humanity and learn the importance of care as a differentiator in an AI world. Avoid the potential pitfalls of excessive reliance on the technology.

Age of Agency is a blueprint for ensuring human agency outpaces computer agency. It boldly pits the limits of machine learning against the infinity of human ability. With this survival guide, you’ll uncover ways to connect with humanity on a deeper level, going beyond anything AI can do.

Ready to become AI-savvy, with your humanity as your differentiator? Dive into the future with the confidence to ride the wave of today’s AI revolution.

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New): Danda B. Rawat, Bhed... Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New)
Danda B. Rawat, Bhed B. Bista, Gongjun Yan
R5,051 Discovery Miles 50 510 Ships in 18 - 22 working days

While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.

AWS Glue Developer Guide (Hardcover): Documentation Team AWS Glue Developer Guide (Hardcover)
Documentation Team
R1,507 Discovery Miles 15 070 Ships in 18 - 22 working days
Cyber Security Meets National Security - International Perspectives on Digital Era Threats (Hardcover): Neil Kent, Irina du... Cyber Security Meets National Security - International Perspectives on Digital Era Threats (Hardcover)
Neil Kent, Irina du Quenoy
R3,461 Discovery Miles 34 610 Ships in 18 - 22 working days

Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.

Windows 2012 Server Network Security - Securing Your Windows Network Systems and Infrastructure (Paperback): Derrick Rountree Windows 2012 Server Network Security - Securing Your Windows Network Systems and Infrastructure (Paperback)
Derrick Rountree
R981 Discovery Miles 9 810 Ships in 10 - 15 working days

"Windows 2012 Server Network Security "provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting

Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. "Windows 2012 Server Network Security "provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.
Provides practical examples of how to secure your Windows network. Focuses specifically on Windows network security rather than general concepts. One of the first books to cover WindowsServer 2012network security. "

Open Source Cloud Computing Systems - Practices and Paradigms (Hardcover): Luis M. Vaquero, Juan Caceres, Juan J. Hierro Open Source Cloud Computing Systems - Practices and Paradigms (Hardcover)
Luis M. Vaquero, Juan Caceres, Juan J. Hierro
R4,906 Discovery Miles 49 060 Ships in 18 - 22 working days

Cloud computing is a new paradigm devoted to the provision of every network resource available as a service to a variety of users. Open Source Cloud Computing Systems: Practices and Paradigms bridges the gap between solutions and users' needs. This book presents the most relevant open source cloud technologies available today. It offers a practical compendium of cloud technologies while also providing information on where to access these technologies, how to install them, and when it is appropriate to use one technology over another. For those deciding to start the endeavor of creating their own cloud, this book serves as a starting point for research on practical purposes and systems design.

Computation and Storage in the Cloud - Understanding the Trade-Offs (Paperback, New): Dong Yuan, Yun Yang, Jinjun Chen Computation and Storage in the Cloud - Understanding the Trade-Offs (Paperback, New)
Dong Yuan, Yun Yang, Jinjun Chen
R986 R856 Discovery Miles 8 560 Save R130 (13%) Ships in 10 - 15 working days

Computation and Storage in the Cloud is the first comprehensive and systematic work investigating the issue of computation and storage trade-off in the cloud in order to reduce the overall application cost. Scientific applications are usually computation and data intensive, where complex computation tasks take a long time for execution and the generated datasets are often terabytes or petabytes in size. Storing valuable generated application datasets can save their regeneration cost when they are reused, not to mention the waiting time caused by regeneration. However, the large size of the scientific datasets is a big challenge for their storage. By proposing innovative concepts, theorems and algorithms, this book will help bring the cost down dramatically for both cloud users and service providers to run computation and data intensive scientific applications in the cloud. Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and usersDescribes several novel strategies for storing application datasets in the cloudIncludes real-world case studies of scientific research applications
Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users

Describes several novel strategies for storing application datasets in the cloud

Includes real-world case studies of scientific research applications

Digital Identity and Access Management - Technologies and Frameworks (Hardcover): Raj Sharman, Sanjukta Das Smith, Manish Gupta Digital Identity and Access Management - Technologies and Frameworks (Hardcover)
Raj Sharman, Sanjukta Das Smith, Manish Gupta
R4,971 Discovery Miles 49 710 Ships in 18 - 22 working days

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of problems, as system managers are faced with major organizational, economic and market changes and are also expected to increase reach and ease of access to users across cyberspace while guaranteeing the reliability and privacy of highly sensitive data.

Software Reuse in the Emerging Cloud Computing Era (Hardcover): Hongji Yang, Xiaodong Liu Software Reuse in the Emerging Cloud Computing Era (Hardcover)
Hongji Yang, Xiaodong Liu
R4,938 Discovery Miles 49 380 Ships in 18 - 22 working days

With the rapid development of computing hardware, high-speed network, web programming, distributed and parallel computing, and other technologies, cloud computing has recently emerged as a commercial reality. Software Reuse in the Emerging Cloud Computing Era targets a spectrum of readers, including researcher, practitioners, educators, and students and even part of the end users in software engineering, computing, networks and distributed systems, and information systems. The handbook will help to clarify the present fast-advancing literature of the current state of art and knowledge in the areas of the development and reuse of reusable assets in emerging software systems and applications, as part of the information science and technology literature. It will no doubt expand the above literature, and promote the exchange and evolution of the above advances in software reuse and cloud computing among multiple disciplines, and a wide spectrum of research, industry, and user communities.

Computational Approaches to the Network Science of Teams (Hardcover): Liangyue Li, Hanghang Tong Computational Approaches to the Network Science of Teams (Hardcover)
Liangyue Li, Hanghang Tong
R1,405 Discovery Miles 14 050 Ships in 18 - 22 working days

Business operations in large organizations today involve massive, interactive, and layered networks of teams and personnel collaborating across hierarchies and countries on complex tasks. To optimize productivity, businesses need to know: what communication patterns do high-performing teams have in common? Is it possible to predict a team's performance before it starts work on a project? How can productive team behavior be fostered? This comprehensive review for researchers and practitioners in data mining and social networks surveys recent progress in the emerging field of network science of teams. Focusing on the underlying social network structure, the authors present models and algorithms characterizing, predicting, optimizing, and explaining team performance, along with key applications, open challenges, and future trends.

Amazon Kinesis Data Analytics Developer Guide (Hardcover): Documentation Team Amazon Kinesis Data Analytics Developer Guide (Hardcover)
Documentation Team
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days
Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Securing the Internet of Things - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,325 Discovery Miles 103 250 Ships in 18 - 22 working days
Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover): S. Srinivasan Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover)
S. Srinivasan
R4,930 Discovery Miles 49 300 Ships in 18 - 22 working days

Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.

Advanced Research on Cloud Computing Design and Applications (Hardcover): Shadi Aljawarneh Advanced Research on Cloud Computing Design and Applications (Hardcover)
Shadi Aljawarneh
R5,129 Discovery Miles 51 290 Ships in 18 - 22 working days

Modern society requires a specialized, persistent approach to IT service delivery. Cloud computing offers the most logical answer through a highly dynamic and virtualized resource made available by an increasing number of service providers. Advanced Research on Cloud Computing Design and Applications shares the latest high quality research results on cloud computing and explores the broad applicability and scope of these trends on an international scale, venturing into the hot-button issue of IT services evolution and what we need to do to be prepared for future developments in cloud computing. This book is an essential reference source for researchers and practitioners in the field of cloud computing, as well as a guide for students, academics, or anyone seeking to learn more about advancement in IT services. This publication features chapters covering a broad range of relevant topics, including cloud computing for e-government, cloud computing in the public sector, security in the cloud, hybrid clouds and outsourced data, IT service personalization, and supply chain in the cloud.

Amazon Virtual Private Cloud Network Administrator Guide (Hardcover): Documentation Team Amazon Virtual Private Cloud Network Administrator Guide (Hardcover)
Documentation Team
R1,186 Discovery Miles 11 860 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,370 Discovery Miles 53 700
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670

 

Partners