0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Management Of Information Security (Paperback, 6th Edition): Michael Whitman, Herbert Mattord Management Of Information Security (Paperback, 6th Edition)
Michael Whitman, Herbert Mattord
R1,321 R1,228 Discovery Miles 12 280 Save R93 (7%) Ships in 10 - 15 working days

Equip your students with a management-focused overview of information security as well as the tools to effectively administer it with Whitman/Mattord's MANAGEMENT OF INFORMATION SECURITY, Sixth Edition.

More than ever, we need to prepare information security management students to build and staff security programs capable of securing systems and networks to meet the challenges in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate weaknesses in current information technologies. This text offers an exceptional blend of skills and experiences to administer and manage the more secure computing environments that organizations need.

Reflecting the latest developments from the field, it includes updated coverage of NIST, ISO and security governance along with emerging concerns like Ransomware, Cloud Computing and the Internet of Things.

Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Hardcover): S. B. Goyal, Nijalingappa Pradeep,... Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Hardcover)
S. B. Goyal, Nijalingappa Pradeep, Piyush Kumar Shukla, Mangesh M. Ghonge, Renjith V. Ravi
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

Blockchain has potential to revolutionize how manufacturers design, engineer, make and scale their products. Blockchain is gradually proving to be an effective "middleware" solution for enabling seamless interoperability within complex supply chains. Due to its technological nature, blockchain enables secure, transparent and fast data exchanges as well as allowing for the creation of immutable records databases The main advantage of Blockchain in Manufacturing Industries is product traceability, supply chain transparency, compliance monitoring, and auditability. Moreover, leveraging blockchain technology into a manufacturing enterprise can enhance its security and reduce the rates of systematic failures. So, blockchain is now used in various sectors of the manufacturing industry, such as automotive, aerospace, defense, pharmaceutical, consumer electronics, textile, food and beverages, and more. Hence, Blockchain should be seen as an investment in future-readiness and customer-centricity, not as an experimental technology - because, the evidence is overwhelming. This book will explore the strengths of Blockchain adaptation in Manufacturing Industries and Logistics Management, cover different use cases of Blockchain Technology for Manufacturing Industries and Logistics Management, and will discuss the role, impact and challenges of adopting Blockchain in Manufacturing industries and Logistics Management. The chapters will also provide the current open issues and future research trends of Blockchain, especially for Manufacturing Industries and Logistics, and will encapsulate quantitative and qualitative research for a wide spectrum of readers of the book.

Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Hardcover): Paul Paxton Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Hardcover)
Paul Paxton
R549 R503 Discovery Miles 5 030 Save R46 (8%) Ships in 18 - 22 working days
Cybersecurity in Smart Homes - Architectures, Solutions and Technologies (Hardcover): Khatoun Cybersecurity in Smart Homes - Architectures, Solutions and Technologies (Hardcover)
Khatoun
R3,483 Discovery Miles 34 830 Ships in 18 - 22 working days

Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.

Conflicts, Crimes and Regulations in Cyberspace (Hardcover): SY Laurent Conflicts, Crimes and Regulations in Cyberspace (Hardcover)
SY Laurent
R3,743 Discovery Miles 37 430 Ships in 18 - 22 working days

The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies. This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and "meso" scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared.

Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Hardcover): Zeph... Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Hardcover)
Zeph Pascall
R761 Discovery Miles 7 610 Ships in 18 - 22 working days
Technical Articles about the Voynich Manuscript (Hardcover): National Security Agency Technical Articles about the Voynich Manuscript (Hardcover)
National Security Agency
R597 Discovery Miles 5 970 Ships in 10 - 15 working days
New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover): National Security Agency New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover)
National Security Agency
R539 Discovery Miles 5 390 Ships in 10 - 15 working days
Limitations and Future Applications of Quantum Cryptography (Hardcover): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Hardcover)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Cryptocurrencies - An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin... Cryptocurrencies - An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin Basics Including Mining, Ethereum Smart Contracts, Trading and Some Info on Programming (Hardcover)
Herbert Jones
R697 R626 Discovery Miles 6 260 Save R71 (10%) Ships in 18 - 22 working days
Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Hardcover)
Harper Fraley
R778 R682 Discovery Miles 6 820 Save R96 (12%) Ships in 18 - 22 working days
Information Security and Ethics - Social and Organizational Issues (Hardcover, illustrated Edition): Marian Quigley Information Security and Ethics - Social and Organizational Issues (Hardcover, illustrated Edition)
Marian Quigley
R2,140 Discovery Miles 21 400 Ships in 18 - 22 working days

Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including web accessibility; the digital divide; youth protection and surveillance; Information security; education; ethics in the Information professions and Internet voting; this book provides an invaluable resource for students, scholars and professionals currently working in information Technology related areas.

Codes and Ciphers - A History Of Cryptography (Hardcover): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Hardcover)
Alexander d'Agapeyeff
R952 Discovery Miles 9 520 Ships in 10 - 15 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography

Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer... Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security (Hardcover)
L. Reznik
R2,554 Discovery Miles 25 540 Ships in 10 - 15 working days

INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device's owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.

Corporate Cybersecurity - Identifying Risks and the Bug Bounty Program (Hardcover): J. Jackson Corporate Cybersecurity - Identifying Risks and the Bug Bounty Program (Hardcover)
J. Jackson
R2,573 Discovery Miles 25 730 Ships in 18 - 22 working days

CORPORATE CYBERSECURITY An insider's guide showing companies how to spot and remedy vulnerabilities in their security programs A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book: Contains a much-needed guide aimed at cyber and application security engineers Presents a unique defensive guide for understanding and resolving security vulnerabilities Encourages research, configuring, and managing programs from the corporate perspective Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLA Written for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program.

Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover): Husrev T. Sencar, Mahalingam... Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover)
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover)
Oded Goldreich
R3,016 Discovery Miles 30 160 Ships in 18 - 22 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Information Security - Foundations, technologies and applications (Hardcover): Ali Ismail Awad, Michael Fairhurst Information Security - Foundations, technologies and applications (Hardcover)
Ali Ismail Awad, Michael Fairhurst
R3,433 R3,098 Discovery Miles 30 980 Save R335 (10%) Ships in 18 - 22 working days

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.

TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R893 R812 Discovery Miles 8 120 Save R81 (9%) Ships in 18 - 22 working days
Information Hiding in Speech Signals for Secure Communication (Paperback): Zhijun Wu Information Hiding in Speech Signals for Secure Communication (Paperback)
Zhijun Wu
R1,293 Discovery Miles 12 930 Ships in 10 - 15 working days

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. "Information Hiding in Speech Signals for Secure Communication" provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core concepts of secure speech communication, the ABS-based information hiding algorithm, and much more.

This book shows how to implement a secure speech communication system, including applications to various network security states. Readers will find information hiding algorithms and techniques (embedding and extracting) that are capable of withstanding the advanced forms of attack. The book presents concepts and applications for all of the most widely used speech coding standards, including G.711, G.721, G.728, G.729 and GSM, along with corresponding hiding and extraction algorithms. Readers will also learn how to use a speech covert communication system over an IP network as well as a speech secure communication system applied in PSTN.
Presents information hiding theory and the mathematical model used for information hiding in speech.Provides a number of methods to hide secret speech information using the most common digital speech coding standards.A combination of practice and theory enables programmers and system designers not only to implement tried and true encryption procedures, but also to consider probable future developments in their designs.

Simple Steps to Data Encryption - A Practical Guide to Secure Computing (Paperback, New): Pete Loshin Simple Steps to Data Encryption - A Practical Guide to Secure Computing (Paperback, New)
Pete Loshin
R682 Discovery Miles 6 820 Ships in 10 - 15 working days

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

Simple descriptions of actual threat scenarios

Simple, step-by-step instructions for securing data

How to use open source, time-proven and peer-reviewed cryptographic software

Easy to follow tips for safer computing

Unbiased and platform-independent coverage of encryption tools and techniques
Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing dataHow to use open source, time-proven and peer-reviewed cryptographic software Easy-to-follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques

Architectures and Frameworks for Developing and Applying Blockchain Technology (Hardcover): Nansi Shi Architectures and Frameworks for Developing and Applying Blockchain Technology (Hardcover)
Nansi Shi
R6,093 Discovery Miles 60 930 Ships in 18 - 22 working days

The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Cryptographic Solutions for Secure Online Banking and Commerce (Hardcover): Kannan Balasubramanian, K. Mala, M. Rajakan Cryptographic Solutions for Secure Online Banking and Commerce (Hardcover)
Kannan Balasubramanian, K. Mala, M. Rajakan
R5,077 Discovery Miles 50 770 Ships in 18 - 22 working days

Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking and Commerce discusses the challenges of providing security for online applications and transactions. Highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols, this book is an essential reference source for financial planners, academicians, researchers, advanced-level students, government officials, managers, and technology developers.

Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R656 R585 Discovery Miles 5 850 Save R71 (11%) Ships in 18 - 22 working days
Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover): Rajeev Singh, Mangey Ram Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover)
Rajeev Singh, Mangey Ram
R4,457 Discovery Miles 44 570 Ships in 10 - 15 working days

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications. De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
OS X Exploits and Defense - Own…
Paul Baccas, Kevin Finisterre, … Paperback R1,278 Discovery Miles 12 780
Managing Catastrophic Loss of Sensitive…
Constantine Photopoulos Paperback R1,265 Discovery Miles 12 650
Physical Security Systems Handbook - The…
Michael Khairallah Hardcover R1,400 Discovery Miles 14 000
The Best Damn Cybercrime and Digital…
Jack Wiles, Anthony Reyes Paperback R1,269 Discovery Miles 12 690
Applied Cryptography for Cyber Security…
Hamid R. Nemati, Yang Li Hardcover R4,605 Discovery Miles 46 050
Digital Watermarking and Steganography
Ingemar Cox, Matthew Miller, … Hardcover R2,109 Discovery Miles 21 090
InfoSecurity 2008 Threat Analysis
Craig Schiller, Seth Fogie, … Paperback R1,146 Discovery Miles 11 460
The History of Information Security - A…
Karl Maria Michael De Leeuw, Jan Bergstra Hardcover R4,752 Discovery Miles 47 520
Information Security Management-Global…
Gurpreet Dhillon Paperback R1,854 Discovery Miles 18 540
How to Cheat at Windows System…
Pawan K. Bhardwaj Paperback R941 Discovery Miles 9 410

 

Partners