Your cart

Your cart is empty

Browse All departments
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,461)
  • -
Author / Contributor

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Animal Biometrics - Techniques and Applications (Hardcover, 1st ed. 2017): Santosh Kumar, Sanjay Kumar Singh, Rishav Singh,... Animal Biometrics - Techniques and Applications (Hardcover, 1st ed. 2017)
Santosh Kumar, Sanjay Kumar Singh, Rishav Singh, Amit Kumar Singh
R2,385 Discovery Miles 23 850 Ships in 7 - 11 working days

This book presents state-of-the-art methodologies and a comprehensive introduction to the recognition and representation of species and individual animals based on their physiological and phenotypic appearances, biometric characteristics, and morphological image patterns. It provides in-depth coverage of this emerging area, with an emphasis on the design and analysis techniques used in visual animal biometrics-based recognition systems. The book offers a comprehensive introduction to visual animal biometrics, addressing a range of recent advances and practices like sensing, feature extraction, feature selection and representation, matching, indexing of feature sets, and animal biometrics-based multimodal systems. It provides authoritative information on all the major concepts, as well as highly specific topics, e.g. the identification of cattle based on their muzzle point image pattern and face images to prevent false insurance claims, or the monitoring and registration of animals based on their biometric features. As such, the book provides a sound platform for understanding the Visual Animal Biometrics paradigm, a vital catalyst for researchers in the field, and a valuable guide for professionals. In addition, it can help both private and public organizations adapt and enhance their classical animal recognition systems.

Eleventh Hour CISSP (R) - Study Guide (Paperback, 3rd edition): Eric Conrad, Seth Misenar, Joshua Feldman Eleventh Hour CISSP (R) - Study Guide (Paperback, 3rd edition)
Eric Conrad, Seth Misenar, Joshua Feldman
R591 Discovery Miles 5 910 Ships in 10 - 15 working days

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam's Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.

The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback, New ed): Kevin D.... The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback, New ed)
Kevin D. Mitnick, William L Simon
R321 R246 Discovery Miles 2 460 Save R75 (23%) Ships in 10 - 15 working days

Hacker extraordinaire, Kevin Mitnick delivers the explosive encore to his bestselling "The Art of Deception". Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling "The Art of Deception", Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair raising stories of real life computer break ins and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him and whose exploits Mitnick now reveals in detail for the first time, including: a group of friends who won nearly a million dollars in Las Vegas by reverse engineering slot machines; two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems; two convicts who joined forces to become hackers inside a Texas prison; and, a "Robin Hood" hacker who penetrated the computer systems of many prominent companies and then told them how he gained access. With riveting "you are there" descriptions of real computer break ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience and attract the attention of both law enforcement agencies and the media.

Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Hardcover, 1st ed. 2016): Igor... Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Hardcover, 1st ed. 2016)
Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy
R4,526 Discovery Miles 45 260 Ships in 7 - 11 working days

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.

Solving Cyber Risk - Protecting Your Company and Society (Hardcover): Andrew Coburn, Eireann Leverett, Gordon Woo Solving Cyber Risk - Protecting Your Company and Society (Hardcover)
Andrew Coburn, Eireann Leverett, Gordon Woo
R986 R721 Discovery Miles 7 210 Save R265 (27%) Ships in 10 - 15 working days

The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with a deeper understanding of existing future threats, and an action plan for safeguarding their organizations. Key Risk Indicators reveal vulnerabilities based on organization type, IT infrastructure and existing security measures, while expert discussion from leading cyber risk specialists details practical, real-world methods of risk reduction and mitigation. By the nature of the business, your organization's customer database is packed with highly sensitive information that is essentially hacker-bait, and even a minor flaw in security protocol could spell disaster. This book takes you deep into the cyber threat landscape to show you how to keep your data secure. Understand who is carrying out cyber-attacks, and why Identify your organization's risk of attack and vulnerability to damage Learn the most cost-effective risk reduction measures Adopt a new cyber risk assessment and quantification framework based on techniques used by the insurance industry By applying risk management principles to cyber security, non-technical leadership gains a greater understanding of the types of threat, level of threat, and level of investment needed to fortify the organization against attack. Just because you have not been hit does not mean your data is safe, and hackers rely on their targets' complacence to help maximize their haul. Solving Cyber Risk gives you a concrete action plan for implementing top-notch preventative measures before you're forced to implement damage control.

The Official (ISC)2 Guide to the CCSP CBK (Hardcover, 2nd Edition): Adam Gordon The Official (ISC)2 Guide to the CCSP CBK (Hardcover, 2nd Edition)
Adam Gordon
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through real-life scenarios, illustrated examples, tables, best practices, and more. This Second Edition features clearer diagrams as well as refined explanations based on extensive expert feedback. Sample questions help you reinforce what you have learned and prepare smarter. Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)^2, endorsed by the Cloud Security Alliance(R) (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)^2 Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come.

Cryptography: A Very Short Introduction (Paperback): Fred Piper, Sean Murphy Cryptography: A Very Short Introduction (Paperback)
Fred Piper, Sean Murphy
R232 R192 Discovery Miles 1 920 Save R40 (17%) Ships in 10 - 15 working days

A clear and informative introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned.

The Art of Deception - Controlling the Human Element of Security (Hardcover): Kevin D. Mitnick, William L Simon The Art of Deception - Controlling the Human Element of Security (Hardcover)
Kevin D. Mitnick, William L Simon; Foreword by Steve Wozniak
R917 R652 Discovery Miles 6 520 Save R265 (29%) Ships in 10 - 15 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover): Dobromir Todorov Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover)
Dobromir Todorov
R3,092 Discovery Miles 30 920 Ships in 10 - 15 working days

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.

A Cryptography Primer - Secrets and Promises (Paperback): Philip N. Klein A Cryptography Primer - Secrets and Promises (Paperback)
Philip N. Klein
R689 Discovery Miles 6 890 Ships in 10 - 15 working days

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.

The Lure - The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals... The Lure - The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals (Paperback, International Edition)
Stephen Schroeder
R652 R562 Discovery Miles 5 620 Save R90 (14%) Ships in 10 - 15 working days

Beginning in the fall of 1999, a number of Internet-related businesses and financial institutions in the United States suffered computer intrusions or "hacks" that originated from Russia. The hackers gained control of the victims' computers, copied and stole private data that included credit card information, and threatened to publish or use the stolen credit cards or inflict damage on the compromised computers unless the victims paid money or gave the hackers a job. Some of the companies gave in and paid off the hackers. Some decided not to. The hackers responded by shutting down parts of their networks and using stolen credit card numbers to order thousands of dollars' worth of computer equipment. THE LURE is the true, riveting story of how these Russian hackers, who bragged that the laws in their country offered them no threat, and who mocked the inability of the FBI to catch them, were caught by an FBI lure designed to appeal to their egos and their greed. The story of the sting operation and subsequent trial is told for the first time here by the Department of Justice's attorney for the prosecution. This fascinating story reads like a crime thriller, but also offers a wealth of information that can be used by IT professionals, business managers, lawyers and academics who wish to learn how to protect systems from abuse, and who want to respond appropriately to network incidents. They also provide insight into the hacker's world and explain how their own words and actions were used against them in a court of law - the evidence provided is in the raw, uncensored words of the hackers themselves. This is a multi-layered true crime story, a real-life law and order story that explains how hackers and computer thieves operate, how the FBI takes them down, and how the Department of Justice prosecutes them in the courtroom.

Applied Cryptography - Protocols, Algorithms and Source Code in C (Hardcover, 20th Anniversary Edition): Bruce Schneier Applied Cryptography - Protocols, Algorithms and Source Code in C (Hardcover, 20th Anniversary Edition)
Bruce Schneier
R1,459 R1,017 Discovery Miles 10 170 Save R442 (30%) Ships in 10 - 15 working days

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. "...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..." -Wired Magazine "...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers . .." -Dr. Dobb's Journal "...easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Decentralized Applications (Paperback): Siraj Raval Decentralized Applications (Paperback)
Siraj Raval
R893 R551 Discovery Miles 5 510 Save R342 (38%) Ships in 10 - 15 working days

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models. Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You'll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use. Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possible Build a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data store Learn about OpenBazaar's decentralized market and its structure for supporting transactions Explore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogo Take an in-depth look at La'Zooz, a P2P ridesharing app that transmits data directly between riders and drivers

Digital Forensics (Paperback): Andre Arnes Digital Forensics (Paperback)
Andre Arnes
R1,526 Discovery Miles 15 260 Ships in 10 - 15 working days

The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry. The author team comprises experts in digital forensics, cybercrime law, information security and related areas. Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology and new ways of exploiting information technology is brought on line, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in Digital Forensics has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years. * Encompasses all aspects of the field, including methodological, scientific, technical and legal matters * Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics * Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images * Features real-word examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media Digital Forensics is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.

Everyday Cryptography - Fundamental Principles and Applications (Hardcover, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Hardcover, 2nd Revised edition)
Keith Martin
R2,261 Discovery Miles 22 610 Ships in 10 - 15 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Database Security (Paperback, New edition): Alfred Basta, Melissa Zgola Database Security (Paperback, New edition)
Alfred Basta, Melissa Zgola
R798 R684 Discovery Miles 6 840 Save R114 (14%) Ships in 15 - 25 working days

As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network security daily. DATABASE SECURITY delivers the know-how and skills IT Professionals must have to protect technology infrastructures, intellectual property, and the company's prosperity. From database installation and testing to auditing and SQL Injection, DATABASE this text delves into the essential processes and protocols that prevent intrusions, while reinforcing each topic with eye-opening, real-world examples. Unlike most texts on database security, which take a computer scientist's analytical approach, Database Security focuses on implementation, and was written expressly for the expanding field of Information Technology careers.

Cryptography InfoSec Pro Guide (Paperback, Ed): Sean Philip Oriyano Cryptography InfoSec Pro Guide (Paperback, Ed)
Sean Philip Oriyano
R851 R674 Discovery Miles 6 740 Save R177 (21%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working tools to data storage architects, security mangers, and others security practitioners who need to possess a thorough understanding of cryptography. True to the hallmarks of all InfoSec Pro Guides, the book imparts the hard-learned lessons and experiences of knowledgeable professionals in security, providing know-how that otherwise takes years to learn. You're led through the Why and How of cryptography, the history of the science, the components of cryptography and how it is applied to various areas in the field of security. Challenging crypto puzzles in every chapter Ready-to-implement cryptographic techniques explained Lingo-Common security terms defined so that you're in the know on the job IMHO-Frank and relevant opinions based on the author's years of industry experience Budget Note-Tips for getting security technologies and processes into your organization's budget In Actual Practice-Exceptions to the rules of security explained in real-world contexts Your Plan-Customizable checklists you can use on the job now Into Action-Tips on how, why, and when to apply new skills and techniques at work

Management of Information Security (Paperback, 4th edition): Michael Whitman, Herbert Mattord Management of Information Security (Paperback, 4th edition)
Michael Whitman, Herbert Mattord
R957 R818 Discovery Miles 8 180 Save R139 (15%) Ships in 15 - 25 working days

MANAGEMENT OF INFORMATION SECURITY, Fourth Edition gives readers an overview of information security and assurance using both domestic and international standards, all from a management perspective. Beginning with the foundational and technical components of information security, this edition then focuses on access control models, information security governance, and information security program assessment and metrics.The Fourth Edition is revised and updated to reflect changes in the field, including the ISO 27000 series, so as to prepare readers to succeed in the workplace.

Coding with XML for Efficiencies in Cataloging and Metadata - Practical applications of XSD, XSLT, and XQuery (Paperback):... Coding with XML for Efficiencies in Cataloging and Metadata - Practical applications of XSD, XSLT, and XQuery (Paperback)
Timothy W. Cole, Myung-Ja (MJ) K Han, Christine Schwartz
R1,424 Discovery Miles 14 240 Ships in 7 - 11 working days

This practical guide will be essential reading for all those needing to come up to speed quickly on XML and how it is used by libraries today. XML and its ancillary technologies XSD, XSLT and XQuery enables librarians to take advantage of powerful, XML-aware applications, facilitates the interoperability and sharing of XML metadata, and makes it possible to realize the full promise of XML to support more powerful and more efficient library cataloguing and metadata workflows. While by no means the only technology arrow in a modern-day cataloguer's or metadata librarian's knowledge and skills quiver, a firm understanding of XML remains relevant and helpful for those working in modern bibliographic control or with information discovery services. Even experienced cataloguers who know their way around the tags and strings of a MARC record occasionally need help and advice when creating metadata for sharing bibliographic records or digital collections on the web. This handbook from the Association for Library Collections & Technical Services (ALCTS) illustrates with examples how XML and associated technologies can be used to edit metadata at scale, streamline and scale up metadata and cataloguing workflows and to extract, manipulate, and construct MARC records and other formats and types of library metadata. Containing 58 sample coding examples throughout, the book covers: essential background information, with a quick review of XML basics transforming XML metadata in HTML schema languages and workflows for XML validation an introduction to XPath and XSLT cataloguing workflows using XSLT the basics of XQuery, including use cases and XQuery expressions and functions working with strings and sequences, including regular expressions. This handbook will be useful reading for cataloguers of all levels of experience how to code for efficiencies. It will also be important reading for students taking Library and Information Science courses, particularly in cataloguing and information organization and retrieval.

CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001) (Paperback, Ed): Fernando Maymi, Brent... CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001) (Paperback, Ed)
Fernando Maymi, Brent Chapman
R1,309 R903 Discovery Miles 9 030 Save R406 (31%) Ships in 10 - 15 working days

This comprehensive self-study guide offers complete coverage of the new CompTIA Cybersecurity Analyst+ certification exam This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CSA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference. Covers every topic on the exam, including: * Threat and vulnerability management * Conducting and analyzing reconnaissance * Responding to network-based threats * Securing a cooperate network * Cyber incident response * Determining the impact of incidents * Preparing the incident response toolkit * Security architectures * Policies, procedures, and controls * Assuring identity and access management * Putting in compensating controls * Secure software development Electronic content includes: * 175+ practice questions * Secured book PDF

Oracle9i RMAN Backup & Recovery (Paperback, Ed): Robert Freeman, Matthew Hart Oracle9i RMAN Backup & Recovery (Paperback, Ed)
Robert Freeman, Matthew Hart
R1,278 R1,005 Discovery Miles 10 050 Save R273 (21%) Ships in 7 - 11 working days

From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology. An indispensable resource for new Oracle users, database administrators, and system administrators.

Cryptography Demystified (Paperback, Ed): John Hershey Cryptography Demystified (Paperback, Ed)
John Hershey
R1,248 R964 Discovery Miles 9 640 Save R284 (23%) Ships in 7 - 11 working days


Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. “Crypto” is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basics—but dread the thick tomes that are your only other option—help is at hand. Cryptography Demystified puts the fundamentals into a 35-module, learn-by-doing package that’s actually fun to use.

You must read this book if—

* You prefer your simplifications from an expert who understands the complexities

* 6 years of success as a short course for students and professionals works for you

* you enjoy hearing the phrase “nothing to memorize”

* ecommerce, email, network security, or wireless communications is part of your bailiwick

* cracking cryptography means a jump up the career ladder

* the words “public-key cryptography,” “channel-based cryptography,” and “prime numbers” pique your interest

* best-practices cryptography is the only secure way for you—and your company—to go

One of the most complex subjects in Information Technology, cryptography gets its due in this down-to-earth, self-teaching tutorial—the first to make the basics of the science truly accessible.

Transforming Information Security - Optimizing Five Concurrent Trends to Reduce Resource Drain (Paperback): Kathleen M. Moriarty Transforming Information Security - Optimizing Five Concurrent Trends to Reduce Resource Drain (Paperback)
Kathleen M. Moriarty
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

Cryptography For Dummies (Paperback, 1st ed): Chey Cobb Cryptography For Dummies (Paperback, 1st ed)
Chey Cobb
R751 R539 Discovery Miles 5 390 Save R212 (28%) Ships in 10 - 15 working days

  • Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking
  • This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations
  • Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards
  • Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately
  • Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies
Recommender System with Machine Learning and Artificial Intelligence - Practical Tools and Applications in Medical,... Recommender System with Machine Learning and Artificial Intelligence - Practical Tools and Applications in Medical, Agricultural and Other Industries (Hardcover)
Sachi Nandan Mohanty, Jyotirmoy Chatterjee, Sarika Jain, Ahmed A. Elngar, Priya Gupta
R4,772 Discovery Miles 47 720 Ships in 7 - 11 working days

This book is a multi-disciplinary effort that involves world-wide experts from diverse fields, such as artificial intelligence, human computer interaction, information technology, data mining, statistics, adaptive user interfaces, decision support systems, marketing, and consumer behavior. It comprehensively covers the topic of recommender systems, which provide personalized recommendations of items or services to the new users based on their past behavior. Recommender system methods have been adapted to diverse applications including social networking, movie recommendation, query log mining, news recommendations, and computational advertising. This book synthesizes both fundamental and advanced topics of a research area that has now reached maturity. Recommendations in agricultural or healthcare domains and contexts, the context of a recommendation can be viewed as important side information that affects the recommendation goals. Different types of context such as temporal data, spatial data, social data, tagging data, and trustworthiness are explored. This book illustrates how this technology can support the user in decision-making, planning and purchasing processes in agricultural & healthcare sectors.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
Security Awareness - Applying Practical…
Mark Ciampa Paperback R746 R641 Discovery Miles 6 410
Mastering Blockchain - Unlocking the…
Lorne Lantz, Daniel Cawrey Paperback R1,422 R1,085 Discovery Miles 10 850
Management of Information Security
Michael Whitman, Herbert Mattord Paperback R937 R803 Discovery Miles 8 030
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
2019 Standard Catalog of…
Mateo Marin Hardcover R903 R638 Discovery Miles 6 380
The Shellcoder's Handbook - Discovering…
Chris Anley, John Heasman, … Paperback R964 R627 Discovery Miles 6 270
Tribe of Hackers Blue Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R565 R467 Discovery Miles 4 670