0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (148)
  • R250 - R500 (529)
  • R500+ (1,579)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Social Media Warfare - Equal Weapons for All (Paperback): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Paperback)
Michael Erbschloe
R1,369 Discovery Miles 13 690 Ships in 12 - 17 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback): William R. Simpson Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback)
William R. Simpson
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.

Analyzing and Securing Social Networks (Paperback): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Paperback)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R1,409 Discovery Miles 14 090 Ships in 12 - 17 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Digital Learning: The Key Concepts (Paperback, 2nd edition): Frank Rennie, Keith Smyth Digital Learning: The Key Concepts (Paperback, 2nd edition)
Frank Rennie, Keith Smyth
R445 R421 Discovery Miles 4 210 Save R24 (5%) Ships in 5 - 10 working days

The new edition of Digital Learning: The Key Concepts is the perfect reference for anyone seeking to navigate the myriad of named concepts, approaches, issues and technologies associated with digital learning. Key terms are explained succinctly, making this book ideal to dip into for a quick answer, or to read from cover-to-cover, in order to gain a mastery of how digital concepts fit within the world of education. Fully updated to include important developments in digital practice and technology in education over the last ten years, this book takes the reader from A to Z through a range of relevant topics including: * Course design * Digital scholarship * Learning design * Open education * Personal learning environments * Social media and social networking. Ideal as an introductory guide, or as a reference book for ongoing referral, this quick-to-use and comprehensive guide is fully crossreferenced and complete with suggestions for further reading and exploration, making it an essential resource for anyone looking to extend their understanding of digital practices, techniques and pedagogic concepts.

Enterprise Level Security 1 & 2 (Hardcover): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Hardcover)
Kevin Foltz, William R. Simpson
R3,174 Discovery Miles 31 740 Ships in 12 - 17 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Mobile Social Networking and Computing - A Multidisciplinary Integrated Perspective (Hardcover): Yufeng Wang, Jianhua Ma Mobile Social Networking and Computing - A Multidisciplinary Integrated Perspective (Hardcover)
Yufeng Wang, Jianhua Ma
R3,065 Discovery Miles 30 650 Ships in 12 - 17 working days

Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanisms, and techniques with the capacity to autonomously manage their functioning and evolution. Currently, most books about mobile networks focus mainly on the technical point of view. Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective not only addresses the theoretical aspects of MSN and computing, but also introduces and categorizes existing applications. It supplies a multidisciplinary perspective that considers the technology, economics, social sciences, and psychology behind MSNs. In addition to fundamental theory, the book investigates the practical issues in MSN, including characteristics, inner structural relationship, incentive mechanisms, resource allocating, information diffusion, search, ranking, privacy, trust, and reputation. Introducing recently developed technologies, modes, and models, the book provides two distinct (but related) viewpoints about MSN applications: socially inspired networking technology and networking technology that uses recent advancements to enhance quality of life. The text illustrates the interaction between the macrolevel structure and the local rational behaviors (microlevel) in MSN. It summarizes currently available MSN development platforms, including Android and iOS, and introduces and categorizes existing applications related to MSN and computing. Both location-based service (LBS) and mobile social networks in proximity (MSNPs) are presented in a comprehensive manner. Highlighting key research opportunities, this much-needed reference outlines incentive mechanisms inspired by classical economics, behavioral economics, and social psychology, and, perhaps for the first time, it presents a summary of the economic and business models of MSNs.

The Leisure Commons - A Spatial History of Web 2.0 (Hardcover): Payal Arora The Leisure Commons - A Spatial History of Web 2.0 (Hardcover)
Payal Arora
R3,493 R2,888 Discovery Miles 28 880 Save R605 (17%) Ships in 12 - 17 working days

There is much excitement about Web 2.0 as an unprecedented, novel, community-building space for experiencing, producing, and consuming leisure, particularly through social network sites. What is needed is a perspective that is invested in neither a utopian or dystopian posture but sees historical continuity to this cyberleisure geography. This book investigates the digital public sphere by drawing parallels to another leisure space that shares its rhetoric of being open, democratic, and free for all: the urban park. It makes the case that the history and politics of public parks as an urban commons provides fresh insight into contemporary debates on corporatization, democratization and privatization of the digital commons. This book takes the reader on a metaphorical journey through multiple forms of public parks such as Protest Parks, Walled Gardens, Corporate Parks, Fantasy Parks, and Global Parks, addressing issues such as virtual activism, online privacy/surveillance, digital labor, branding, and globalization of digital networks. Ranging from the 19th century British factory garden to Tokyo Disneyland, this book offers numerous spatial metaphors to bring to life aspects of new media spaces. Readers looking for an interdisciplinary, historical and spatial approach to staid Web 2.0 discourses will undoubtedly benefit from this text.

Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover): T. Ananth Kumar, T. S. Arun Samuel, R.... Privacy and Security Challenges in Cloud Computing - A Holistic Approach (Hardcover)
T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy
R3,555 Discovery Miles 35 550 Ships in 9 - 15 working days

This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardware and networks, performance, evolving IoT areas, edge computing, etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing, cyber artificial intelligence (AI) platform for cloud security, and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering, electronics engineering, computer science, and information technology.

Technology - New Trajectories in Law (Hardcover): Penny Crofts, Honni Van Rijswijk Technology - New Trajectories in Law (Hardcover)
Penny Crofts, Honni Van Rijswijk
R1,544 Discovery Miles 15 440 Ships in 12 - 17 working days

Placing contemporary technological developments in their historical context, this book argues for the importance of law in their regulation. Technological developments are focused upon overcoming physical and human constraints. There are no normative constraints inherent in the quest for ongoing and future technological development. In contrast, law proffers an essential normative constraint. Just because we can do something, does not mean that we should. Through the application of critical legal theory and jurisprudence to pro-actively engage with technology, this book demonstrates why legal thinking should be prioritised in emerging technological futures. This book articulates classic skills and values such as ethics and justice to ensure that future and ongoing legal engagements with socio-technological developments are tempered by legal normative constraints. Encouraging them to foreground questions of justice and critique when thinking about law and technology, the book addresses law students and teachers, lawyers and critical thinkers concerned with the proliferation of technology in our lives.

Networks of Power in Digital Copyright Law and Policy - Political Salience, Expertise and the Legislative Process (Hardcover,... Networks of Power in Digital Copyright Law and Policy - Political Salience, Expertise and the Legislative Process (Hardcover, New)
Benjamin Farrand
R4,210 R2,890 Discovery Miles 28 900 Save R1,320 (31%) Ships in 12 - 17 working days

In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.

AI for the Sustainable Development Goals (Paperback): Henrik Skaug Saetra AI for the Sustainable Development Goals (Paperback)
Henrik Skaug Saetra
R738 Discovery Miles 7 380 Ships in 9 - 15 working days

accessible for readers unfamiliar with both SDGs and ESG concepts; it will enable leaders and businesses to assess deployment and development of AI more easily

Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback): Sinjini Mitra, Mikhail Gofman Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback)
Sinjini Mitra, Mikhail Gofman
R1,446 Discovery Miles 14 460 Ships in 12 - 17 working days

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,368 Discovery Miles 13 680 Ships in 12 - 17 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback): Todd Fitzgerald Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback)
Todd Fitzgerald
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.

You Will Get Through This Night (Hardcover): Daniel Howell You Will Get Through This Night (Hardcover)
Daniel Howell
R550 R473 Discovery Miles 4 730 Save R77 (14%) Ships in 12 - 17 working days
Entertain me! by Schoen magazine - From music to film to fashion to art (Hardcover): Raoul Keil Entertain me! by Schoen magazine - From music to film to fashion to art (Hardcover)
Raoul Keil
R873 Discovery Miles 8 730 Ships in 12 - 17 working days

Entertain Me! features the most popular influencers and celebrities from Schoen! magazine, a biannual English language publication and online platform with a cutting-edge aesthetic. This book presents a visual explosion of talent in film, music, TV, fashion and art from its debut as an online forum in 2009 to 2020. Stunning photographs from the worlds of culture, fashion, and beauty showcase the biggest names and rising stars who entertain and lead the world in high-octane creativity. It will appeal to the visionary, the collector, and the fashion-conscious, and is intended not only for the magazine's established and loyal readership, but also for a broader demographic of readers around the globe who monitor the pulse of the latest in creative talent.

100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback): Nick Vandome 100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback)
Nick Vandome
R156 Discovery Miles 1 560 Ships in 12 - 17 working days
Security Risk Models for Cyber Insurance (Hardcover): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Hardcover)
Caroline Baylon, Jose Vila, David Rios Insua
R3,614 Discovery Miles 36 140 Ships in 12 - 17 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Generic Top-Level Domains - A Study of Transnational Private Regulation (Hardcover): Tobias Mahler Generic Top-Level Domains - A Study of Transnational Private Regulation (Hardcover)
Tobias Mahler
R3,155 Discovery Miles 31 550 Ships in 12 - 17 working days

This topical book critically examines the regulatory framework for generic Top-Level Domains (gTLDs) on the Internet. The regulation drawn up by the Internet Corporation for Assigned Names and Numbers (ICANN) applies at a global level, complementing national and international law. These rules form part of a growing body of transnational private regulation. Generic Top-Level Domains offers a clear and engaging analysis of how ICANN has tackled a diverse set of regulatory issues related to the introduction of new gTLDs, such as property rights, competition and consumer protection. Studying recent case law, the book argues for a stronger focus on procedural fairness for future introductions of new gTLDs. It also highlights how ICANN's contractual framework regulates the registration and use of domain names and argues that ICANN's regulatory authority ought to be clarified in order to avoid regulatory overreach. Uniquely comprehensive, this book will appeal to students and scholars with an interest in Internet governance, domain name law and transnational private regulation. Practitioners working in the domain name industry will also find this a valuable resource.

Prototype Nation - China and the Contested Promise of Innovation (Paperback): Silvia M. Lindtner Prototype Nation - China and the Contested Promise of Innovation (Paperback)
Silvia M. Lindtner
R580 Discovery Miles 5 800 Ships in 12 - 17 working days

A vivid look at China's shifting place in the global political economy of technology production How did China's mass manufacturing and "copycat" production become transformed, in the global tech imagination, from something holding the nation back to one of its key assets? Prototype Nation offers a rich transnational analysis of how the promise of democratized innovation and entrepreneurial life has shaped China's governance and global image. With historical precision and ethnographic detail, Silvia Lindtner reveals how a growing distrust in Western models of progress and development, including Silicon Valley and the tech industry after the financial crisis of 2007-8, shaped the rise of the global maker movement and the vision of China as a "new frontier" of innovation. Lindtner's investigations draw on more than a decade of research in experimental work spaces-makerspaces, coworking spaces, innovation hubs, hackathons, and startup weekends-in China, the United States, Africa, Europe, Taiwan, and Singapore, as well as in key sites of technology investment and industrial production-tech incubators, corporate offices, and factories. She examines how the ideals of the maker movement, to intervene in social and economic structures, served the technopolitical project of prototyping a "new" optimistic, assertive, and global China. In doing so, Lindtner demonstrates that entrepreneurial living influences governance, education, policy, investment, and urban redesign in ways that normalize the persistence of sexism, racism, colonialism, and labor exploitation. Prototype Nation shows that by attending to the bodies and sites that nurture entrepreneurial life, technology can be extricated from the seemingly endless cycle of promise and violence. Cover image: Courtesy of Cao Fei, Vitamin Creative Space and Spru th Magers

Law, Technology and Dispute Resolution - The Privatisation of Coercion (Paperback): Riikka Koulu Law, Technology and Dispute Resolution - The Privatisation of Coercion (Paperback)
Riikka Koulu
R1,266 Discovery Miles 12 660 Ships in 12 - 17 working days

The use of new information and communication technologies both inside the courts and in private online dispute resolution services is quickly changing everyday conflict management. However, the implications of the increasingly disruptive role of technology in dispute resolution remain largely undiscussed. In this book, assistant professor of law and digitalisation Riikka Koulu examines the multifaceted phenomenon of dispute resolution technology, focusing specifically on private enforcement, which modern technology enables on an unforeseen scale. The increase in private enforcement confounds legal structures and challenges the nation-state's monopoly on violence. And, in this respect, the author argues that the technology-driven privatisation of enforcement - from direct enforcement of e-commerce platforms to self-executing smart contracts in the blockchain - brings the ethics of law's coercive nature out into the open. This development constitutes a new, and dangerous, grey area of conflict management, which calls for transparency and public debate on the ethical implications of dispute resolution technology.

Regulating Blockchain - Critical Perspectives in Law and Technology (Paperback): Robert Herian Regulating Blockchain - Critical Perspectives in Law and Technology (Paperback)
Robert Herian
R1,055 Discovery Miles 10 550 Ships in 12 - 17 working days

As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently. Yet in a short space of time it has become more mainstream and synonymous with a spectacular variety of commercial and civic 'problem'/'solution' concepts and ideals. From commodity provenance, to electoral fraud prevention, to a wholesale decentralisation of power and the banishing of the exploitative practices of 'middlemen', blockchain stakeholders are nothing short of evangelical in their belief that it is a force for good. For these reasons and more the technology has captured the attention of entrepreneurs, venture capitalists, global corporations and governments the world over. Blockchain may indeed offer a unique technical opportunity to change cultures of transparency and trust within cyberspace, and as 'revolutionary' and 'disruptive' has the potential to shift global socioeconomic and political conventions. But as a yet largely unregulated, solutionist-driven phenomenon, blockchain exists squarely within the boundaries of capitalist logic and reason, fast becoming central to the business models of many sources of financial and political power the technology was specifically designed to undo, and increasingly allied to neoliberal strategies with scant regard for collective, political or democratic accountability in the public interest. Regulating Blockchain casts a critical eye over the technology, its 'ecosystem' of stakeholders, and offers a challenge to the prevailing discourse proclaiming it to be the great techno-social enabler of our times.

Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition): Rebecca Herold Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition)
Rebecca Herold
R3,945 Discovery Miles 39 450 Ships in 12 - 17 working days

Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:

  • Lists the laws and associated excerpts of the specific passages that require training and awareness
  • Contains a plethora of forms, examples, and samples in the book's 22 appendices
  • Highlights common mistakes that many organizations make
  • Directs readers to additional resources for more specialized information
  • Includes 250 awareness activities ideas and 42 helpful tips for trainers

Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.

Praise for:

The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly..
-NoticeBored.com

Redesigning Work - How to Transform Your Organisation and Make Hybrid Work for Everyone (Paperback): Lynda Gratton Redesigning Work - How to Transform Your Organisation and Make Hybrid Work for Everyone (Paperback)
Lynda Gratton
R350 R280 Discovery Miles 2 800 Save R70 (20%) Ships in 5 - 10 working days

We are experiencing the greatest global shift in the world of work for a century. So, how do we make the most of this unique opportunity and radically redesign the way we work - forever? Professor Lynda Gratton is the global thought-leader on the future of work. Based on thirty years of research into the technological, demographic, cultural and societal trends that are shaping work, and building on what we learnt through our experiences of the global pandemic, Lynda Gratton presents her innovative four step framework for redesigning work that will help you: Understand the challenges your business is facing Reimagine creative, new approaches and processes Model and Test these within your organisation Act and Create based on contemporary, data-led feedback Whether you're leading a small team or running a multinational, this is the time to make lasting change and equip your business for the future. Redesigning Work is the definitive book on how to transform your organisation and make hybrid working work for you. It will help your team embrace change, increase productivity and thrive in our new, more flexible working world.

Power Formula for LinkedIn Success - 3rd Ed (Paperback, 3rd Revised edition): Wayne Breitbarth Power Formula for LinkedIn Success - 3rd Ed (Paperback, 3rd Revised edition)
Wayne Breitbarth
R500 R446 Discovery Miles 4 460 Save R54 (11%) Ships in 12 - 17 working days

3rd Edition of the world's most popular LinkedIn book. Completely revised and updated. Many LinkedIn books focus solely on creating a killer LinkedIn profile. But LinkedIn is not a passive sport. You can't just sit around waiting for people to find your a

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Tomorrow, and Tomorrow, and Tomorrow…
Gabrielle Zevin Paperback  (1)
R465 R391 Discovery Miles 3 910
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R337 Discovery Miles 3 370
Metal Slug: The Ultimate History
Bitmap Books Hardcover  (1)
R1,300 Discovery Miles 13 000
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,357 Discovery Miles 63 570
Financial Regulation and Technology - A…
Iain Sheridan Paperback R2,676 Discovery Miles 26 760
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,159 Discovery Miles 11 590
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Artificial Intelligence and the Media…
Taina Pihlajarinne, Anette Alen-Savikko Hardcover R3,304 Discovery Miles 33 040
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
You're Doing Great! - And Other Reasons…
Tom Papa Paperback R526 R437 Discovery Miles 4 370

 

Partners