0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (166)
  • R250 - R500 (520)
  • R500+ (1,481)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,346 Discovery Miles 23 460 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover): Luke Munn Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover)
Luke Munn
R1,375 Discovery Miles 13 750 Ships in 12 - 17 working days

How do cables and data centers think? This book investigates how information infrastructures enact particular forms of knowledge. It juxtaposes the pervasive logics of speed, efficiency, and resilience with more communal and ecological ways of thinking and being, turning technical "solutions" back into open questions about what society wants and what infrastructures should do. Moving from data centers in Hong Kong to undersea cables in Singapore and server clusters in China, Munn combines rich empirical material with insights drawn from media and cultural studies, sociology, and philosophy. This critical analysis stresses that infrastructures are not just technical but deeply epistemological, privileging some actions and actors while sidelining others. This innovative exploration of the values and visions at the heart of our technologies will interest students, scholars, and researchers in the areas of communication studies, digital media, technology studies, sociology, philosophy of technology, information studies, and geography.

Into the Metaverse - The Essential Guide to the Business Opportunities of the Web3 Era (Hardcover): Cathy Hackl Into the Metaverse - The Essential Guide to the Business Opportunities of the Web3 Era (Hardcover)
Cathy Hackl
R601 Discovery Miles 6 010 Ships in 12 - 17 working days

An illuminating insight into the Metaverse - what it is, how it works, and and why it will soon be playing a major role in business, technology and society.

In Into the Metaverse, Cathy Hackl, a globally recognized futurist and one of the world's first Chief Metaverse Officers, shares her insights on what companies need to do to harness the next iteration of the internet - the metaverse. In this book you'll find a wealth of information on issues such as:

- What is the metaverse and what it means for your brand, organization or company
- How to make money in the metaverse through understanding the underlying concepts behind it such as gaming, synthetic media, spatial computing and artificial intelligence.
- How to lead in the metaverse through industries that are already forging ahead, such as fashion and marketing.
- Who should manage the metaverse function within your organization and why some companies should consider creating a role for a Chief Metaverse Officer.
- Finally, how to protect the metaverse and action steps you can take towards the future.

Essential reading for any executive, Into the Metaverse, will reshape how you think about the internet and its place for those who want to lead successful businesses, today and into the future. If the internet was first used to connect us to information, and then developed into a social media forum to connect people, then Web3, which connects people, places and things, will help enable the successor state to today's mobile internet - the Metaverse. It will bring together and merge our physical and digital lives, and - in the same way that social media upended our lives and our businesses - the Metaverse will shake things up even more. Into the Metaverse is the essential business guide to understanding the ground-breaking technologies that enable this monumental shift and the opportunities it presents from a business and societal perspective.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated edition)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R2,763 Discovery Miles 27 630 Ships in 12 - 17 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.

The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Help is just a click away: Social Network Sites and Support for Parents of Children with Special Needs (Paperback): I-Jung... Help is just a click away: Social Network Sites and Support for Parents of Children with Special Needs (Paperback)
I-Jung Grace Lu
R1,639 Discovery Miles 16 390 Ships in 10 - 15 working days
Twitter in 30 Minutes (3rd Edition) - How to Connect with Interesting People, Write Great Tweets, and Find Information... Twitter in 30 Minutes (3rd Edition) - How to Connect with Interesting People, Write Great Tweets, and Find Information That's Relevant to You (Hardcover, 3rd Revised and Updated ed.)
Ian Lamont
R458 Discovery Miles 4 580 Ships in 12 - 17 working days
Legal Principles for Combatting Cyberlaundering (Hardcover, 2014): Daniel Adeoye Leslie Legal Principles for Combatting Cyberlaundering (Hardcover, 2014)
Daniel Adeoye Leslie
R4,437 Discovery Miles 44 370 Ships in 12 - 17 working days

This volume deals with the very novel issue of cyber laundering. The book investigates the problem of cyber laundering legally and sets out why it is of a grave legal concern locally and internationally. The book looks at the current state of laws and how they do not fully come to grips with the problem. As a growing practice in these modern times, and manifesting through technological innovations, cyber laundering is the birth child of money laundering and cybercrime. It concerns how the internet is used for 'washing' illicit proceeds of crime. In addition to exploring the meaning and ambits of the problem with concrete real-life examples, more importantly, a substantial part of the work innovates ways in which the dilemma can be curbed legally.

This volume delves into a very grey area of law, daring a yet unthreaded territory and scouring undiscovered paths where money laundering, cybercrime, information technology and international law converge. In addition to unearthing such complexity, the hallmark of this book is in the innovative solutions and dynamic remedies it postulates.

CyberBRICS - Cybersecurity Regulations in the BRICS Countries (Hardcover, 1st ed. 2021): Luca Belli CyberBRICS - Cybersecurity Regulations in the BRICS Countries (Hardcover, 1st ed. 2021)
Luca Belli
R3,628 Discovery Miles 36 280 Ships in 12 - 17 working days

This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries - namely, Brazil, Russia, India, China, and South Africa. The project has three main objectives: 1) to map existing regulations; 2) to identify best practices; and 3) to develop policy recommendations in the various areas that compose cybersecurity governance, with a particular focus on the strategies adopted by the BRICS countries to date. Each study covers five essential dimensions of cybersecurity: data protection, consumer protection, cybercrime, the preservation of public order, and cyberdefense. The BRICS countries were selected not only for their size and growing economic and geopolitical relevance but also because, over the next decade, projected Internet growth is expected to occur predominantly in these countries. Consequently, the technology, policy and governance arrangements defined by the BRICS countries are likely to impact not only the 3.2 billion people living in them, but also the individuals and businesses that choose to utilize increasingly popular applications and services developed in BRICS countries according to BRICS standards. Researchers, regulators, start-up innovators and other Internet stakeholders will find this book a valuable guide to the inner workings of key cyber policies in this rapidly growing region.

Data - New Trajectories in Law (Paperback): Robert Herian Data - New Trajectories in Law (Paperback)
Robert Herian
R655 Discovery Miles 6 550 Ships in 12 - 17 working days

This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.

Research Anthology on Implementing Sentiment Analysis Across Multiple Disciplines, VOL 1 (Hardcover): Information R Management... Research Anthology on Implementing Sentiment Analysis Across Multiple Disciplines, VOL 1 (Hardcover)
Information R Management Association
R16,646 Discovery Miles 166 460 Ships in 10 - 15 working days
Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R2,820 Discovery Miles 28 200 Ships in 12 - 17 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

The EU Artificial Intelligence Act - Regulating Subliminal AI Systems (Hardcover): Rostam J. Neuwirth The EU Artificial Intelligence Act - Regulating Subliminal AI Systems (Hardcover)
Rostam J. Neuwirth
R1,550 Discovery Miles 15 500 Ships in 12 - 17 working days

AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,528 Discovery Miles 25 280 Ships in 12 - 17 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

Governing Privacy in Knowledge Commons (Hardcover): Madelyn Rose Sanfilippo, Brett M Frischmann, Katherine J. Strandburg Governing Privacy in Knowledge Commons (Hardcover)
Madelyn Rose Sanfilippo, Brett M Frischmann, Katherine J. Strandburg
R3,054 Discovery Miles 30 540 Ships in 12 - 17 working days

Governing Privacy in Knowledge Commons explores how privacy impacts knowledge production, community formation, and collaborative governance in diverse contexts, ranging from academia and IoT, to social media and mental health. Using nine new case studies and a meta-analysis of previous knowledge commons literature, the book integrates the Governing Knowledge Commons framework with Helen Nissenbaum's Contextual Integrity framework. The multidisciplinary case studies show that personal information is often a key component of the resources created by knowledge commons. Moreover, even when it is not the focus of the commons, personal information governance may require community participation and boundaries. Taken together, the chapters illustrate the importance of exit and voice in constructing and sustaining knowledge commons through appropriate personal information flows. They also shed light on the shortcomings of current notice-and-consent style regulation of social media platforms. This title is also available as Open Access on Cambridge Core.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,345 Discovery Miles 13 450 Ships in 12 - 17 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Security Risk Models for Cyber Insurance (Paperback): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Paperback)
Caroline Baylon, Jose Vila, David Rios Insua
R1,373 Discovery Miles 13 730 Ships in 12 - 17 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Research Anthology on Applying Social Networking Strategies to Classrooms and Libraries, VOL 4 (Hardcover): Information R... Research Anthology on Applying Social Networking Strategies to Classrooms and Libraries, VOL 4 (Hardcover)
Information R Management Association
R9,438 Discovery Miles 94 380 Ships in 12 - 17 working days
Hacking in the Humanities - Cybersecurity, Speculative Fiction, and Navigating a Digital Future (Hardcover): Aaron Mauro Hacking in the Humanities - Cybersecurity, Speculative Fiction, and Navigating a Digital Future (Hardcover)
Aaron Mauro
R2,330 Discovery Miles 23 300 Ships in 12 - 17 working days

What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and humanistic - perspective to the issue of cybersecurity. It argues that through these stories we are able to predict the future political, cultural, and social realities emerging from technological change. Making the case for a security-minded humanities education, this book examines pressing issues of data security, privacy, social engineering and more, illustrating how the humanities offer the critical, technical, and ethical insights needed to oppose the normalization of surveillance, disinformation, and coercion. Within this counter-cultural approach to technology, this book offers a model of activism to intervene and meaningfully resist government and corporate oversight online. In doing so, it argues for a wider notion of literacy, which includes the ability to write and fight the computer code that shapes our lives.

The ABC's of Adulting (Hardcover): Samantha K Smith The ABC's of Adulting (Hardcover)
Samantha K Smith; Illustrated by Kegan Smith
R560 Discovery Miles 5 600 Ships in 12 - 17 working days
Cryptocurrency Trading & Investing - 2 manuscripts (Hardcover): Keizer Soeze Cryptocurrency Trading & Investing - 2 manuscripts (Hardcover)
Keizer Soeze
R943 R778 Discovery Miles 7 780 Save R165 (17%) Ships in 10 - 15 working days
Social Media in the Digital Age - History, Ethics, and Professional Uses (Hardcover): Rebecca Coates Nee Social Media in the Digital Age - History, Ethics, and Professional Uses (Hardcover)
Rebecca Coates Nee
R3,166 Discovery Miles 31 660 Ships in 12 - 17 working days
Cryptocurrency Trading - Strategies & Techniques for successful Portfolio Management (Hardcover): Keizer Soeze Cryptocurrency Trading - Strategies & Techniques for successful Portfolio Management (Hardcover)
Keizer Soeze
R725 R605 Discovery Miles 6 050 Save R120 (17%) Ships in 10 - 15 working days
Instagram Marketing - How to Dominate Your Niche in 2019 with Your Small Business and Personal Brand by Marketing on a Super... Instagram Marketing - How to Dominate Your Niche in 2019 with Your Small Business and Personal Brand by Marketing on a Super Popular Social Media Platform and Leveraging its Influencers (Hardcover)
Matt Golden
R717 R596 Discovery Miles 5 960 Save R121 (17%) Ships in 10 - 15 working days
Building Your Personal Brand in the Age of Social Media (Hardcover, Large Type / Large Print Ed): George Stallion Building Your Personal Brand in the Age of Social Media (Hardcover, Large Type / Large Print Ed)
George Stallion
R452 Discovery Miles 4 520 Ships in 12 - 17 working days
An Interdisciplinary Approach to Modern Network Security (Hardcover): Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia,... An Interdisciplinary Approach to Modern Network Security (Hardcover)
Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le
R2,895 Discovery Miles 28 950 Ships in 12 - 17 working days

An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo Paperback R1,471 Discovery Miles 14 710
Social Media Marketing - A Quickstudy…
Edwards Poster R212 Discovery Miles 2 120
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,015 Discovery Miles 30 150
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo Paperback R639 Discovery Miles 6 390
The Honest Guide to Becoming A Digital…
Elizabeth Benton Paperback R202 Discovery Miles 2 020
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,078 Discovery Miles 60 780
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Online Political Hate Speech in Europe…
Giovanni Ziccardi Hardcover R2,733 Discovery Miles 27 330
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
Tomorrow, and Tomorrow, and Tomorrow…
Gabrielle Zevin Paperback  (1)
R369 Discovery Miles 3 690

 

Partners