0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (146)
  • R250 - R500 (506)
  • R500+ (1,613)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

#newpower (Paperback): Jeremy Heimans, Henry Timms #newpower (Paperback)
Jeremy Heimans, Henry Timms 1
R230 R182 Discovery Miles 1 820 Save R48 (21%) Ships in 3 - 5 working days

For most of human history the rules of power were clear: power was something to be seized, and then jealously guarded. Under this 'Old Power' we lived in a world of rulers and subjects.

Now, we all sense that something has changed. From #MeToo to Harvey Weinstein; Corbyn to Trump; from YouTube sensations to darker phenomena such as the emergence of ISIS – in our new hyper-connected world, ideas and movements can spread and flourish with astonishing force and speed.

In New Power, Jeremy Heimans and Henry Timms confront the biggest story of our age and trace how New Power is the key to understanding where we are and will prosper in the 21st Century.

Drawing on examples from business, politics, popular culture and social justice, as well as case studies of organisations like LEGO and TED, they explain the forces that are changing the course of our age.

In a world increasingly shaped by New Power, this book will show you how to shape your future.

100 Top Tips - Create Your Smart Home to Stay Safe and Save Money (Paperback): Nick Vandome 100 Top Tips - Create Your Smart Home to Stay Safe and Save Money (Paperback)
Nick Vandome
R156 Discovery Miles 1 560 Ships in 12 - 17 working days
You Will Get Through This Night (Hardcover): Daniel Howell You Will Get Through This Night (Hardcover)
Daniel Howell
R561 R482 Discovery Miles 4 820 Save R79 (14%) Ships in 12 - 17 working days
Electronic Word of Mouth as a Promotional Technique - New Insights from Social Media (Hardcover): Shu-Chuan Chu, Juran Kim,... Electronic Word of Mouth as a Promotional Technique - New Insights from Social Media (Hardcover)
Shu-Chuan Chu, Juran Kim, Charles R Taylor
R3,986 Discovery Miles 39 860 Ships in 12 - 17 working days

Recent years have seen digital advertising grow to the point where it will soon overtake television as the no. 1 advertising medium. In the online environment, consumers interact and share their thoughts on brands and their experiences using them. These electronic word-of-mouth (eWOM) communications have become a very important to the success of products. In today's cluttered environment, it is especially important to study how the practice of eWOM advertising operates, and how marketers can influence eWOM in social media and other online sites. This volume starts with a chapter on the current state of knowledge on eWOM and then turns its attention to current research articles on a variety of eWOM formats. These include the posting of selfies on social media, the influence of review types on consumer perception and purchase intention, the effects of preannouncement messages, and how user-generated content can be used to induce effectiveness of eWOM on social media. The relationship of eWOM to brand building is emphasized in several of the chapters. This book was originally published as a special issue of the International Journal of Advertising.

Managing Trust in Cyberspace (Paperback): Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Managing Trust in Cyberspace (Paperback)
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
R1,838 Discovery Miles 18 380 Ships in 12 - 17 working days

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,742 Discovery Miles 17 420 Ships in 12 - 17 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Intellectual Property Rights and Emerging Technology - 3D Printing in China (Hardcover): Hing Kai Chan, Hui Leng Choo, Onyeka... Intellectual Property Rights and Emerging Technology - 3D Printing in China (Hardcover)
Hing Kai Chan, Hui Leng Choo, Onyeka Osuji, James Griffin
R3,984 Discovery Miles 39 840 Ships in 12 - 17 working days

3D printing poses many challenges to the traditional law of intellectual property (IP). This book develops a technical method to help overcome some of these legal challenges and difficulties. This is a collection of materials from empirical interviews, workshops and publications that have been carried out in one of the world's leading research projects into the legal impact of 3D printing. The project was designed to establish what legal challenges 3D printing companies thought they faced, and having done that, to establish a technical framework for a solution.

Our Digital Rights to the City (Paperback): Joe Shaw, Mark Graham Our Digital Rights to the City (Paperback)
Joe Shaw, Mark Graham
R201 Discovery Miles 2 010 Ships in 9 - 15 working days
Tomorrow's Lawyers - An Introduction to your Future (Paperback, 3rd Revised edition): Richard Susskind Tomorrow's Lawyers - An Introduction to your Future (Paperback, 3rd Revised edition)
Richard Susskind
R578 Discovery Miles 5 780 Ships in 9 - 15 working days

In its first and second editions, Tomorrow's Lawyers became an international bestseller, widely read and cited by practitioners and students. The third edition focuses on the law and lawyers in the 2020s. For Richard Susskind, the future of legal service is neither Grisham nor Rumpole. Instead, he predicts a world of online courts, AI-based global legal businesses, disruptive legal technologies, liberalized markets, commoditization, alternative sourcing, simulated practice on the metaverse, and many new legal jobs. This volume is a definitive and updated introduction to this future - for aspiring lawyers, and for all who want to modernize and upgrade our legal and justice systems. It offers practical guidance for everyone intending to build careers and businesses in law. Written in an era of greater technological advance than humanity has ever witnessed, this work is a call to arms: it challenges those who feel that the law and lawyers are somehow immune from technological advance; it draws attention to the unaffordability and inaccessibility of legal service, for businesses and citizens alike; it invites the next generation of lawyers to harness the power of technology in improving and even overhauling the way in which legal and court service is currently provided. Tomorrow's Lawyers identifies new opportunities for lawyers, new ways of helping clients and the community. It enjoins its readers to become involved in building the systems that will replace outmoded forms of legal work. It argues that it is both a privilege and an obligation for tomorrow's lawyers to embrace and bring about change. A must-read for legal undergraduates, aspiring and young lawyers, senior practitioners, leaders in law firms and legal businesses, law professors and law teachers.

Practical Hacking Techniques and Countermeasures (Hardcover): Mark D Spivey Practical Hacking Techniques and Countermeasures (Hardcover)
Mark D Spivey
R4,882 Discovery Miles 48 820 Ships in 12 - 17 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Psychoanalysis and Digital Culture - Audiences, Social Media, and Big Data (Hardcover): Jacob Johanssen Psychoanalysis and Digital Culture - Audiences, Social Media, and Big Data (Hardcover)
Jacob Johanssen
R4,132 Discovery Miles 41 320 Ships in 12 - 17 working days

Psychoanalysis and Digital Culture offers a comprehensive account of our contemporary media environment-digital culture and audiences in particular-by drawing on psychoanalysis and media studies frameworks. It provides an introduction to the psychoanalytic affect theories of Sigmund Freud and Didier Anzieu and applies them theoretically and methodologically in a number of case studies. Johanssen argues that digital media fundamentally shape our subjectivities on affective and unconscious levels, and he critically analyses phenomena such as television viewing, Twitter use, affective labour on social media, and data-mining. How does watching television involve the body? Why are we so drawn to reality television? Why do we share certain things on social media and not others? How are bodies represented on social media? How do big data and data mining influence our identities? Can algorithms help us make better decisions? These questions amongst others are addressed in the chapters of this wide-ranging book. Johanssen shows in a number of case studies how a psychoanalytic angle can bring new insights to audience studies and digital media research more generally. From audience research with viewers of the reality television show Embarrassing Bodies and how they unconsciously used it to work through feelings about their own bodies, to a critical engagement with Hardt and Negri's notion of affective labour and how individuals with bodily differences used social media for their own affective-digital labour, the book suggests that an understanding of affect based on Freud and Anzieu is helpful when thinking about media use. The monograph also discusses the perverse implications of algorithms, big data and data mining for subjectivities. In drawing on empirical data and examples throughout, Johanssen presents a compelling analysis of our contemporary media environment.

Young People, Social Media and Health (Hardcover): Victoria Goodyear, Kathleen Armour Young People, Social Media and Health (Hardcover)
Victoria Goodyear, Kathleen Armour
R4,146 Discovery Miles 41 460 Ships in 12 - 17 working days

The book is relevant for various regions including the US, UK, Australia, Western European nations and New Zealand. Key informants offer insights for policy and practice. Rich theoretical analysis further contextualizes findings and provides analysis to advance the field.

Asset Protection and Security Management Handbook (Hardcover): James Walsh Asset Protection and Security Management Handbook (Hardcover)
James Walsh
R3,747 Discovery Miles 37 470 Ships in 12 - 17 working days

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

Software Test Attacks to Break Mobile and Embedded Devices (Hardcover): Jon Duncan Hagar Software Test Attacks to Break Mobile and Embedded Devices (Hardcover)
Jon Duncan Hagar
R5,362 Discovery Miles 53 620 Ships in 12 - 17 working days

Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.

Information Security Management Handbook - Volume IV (Hardcover): Harold Tipton Information Security Management Handbook - Volume IV (Hardcover)
Harold Tipton
R11,437 Discovery Miles 114 370 Ships in 12 - 17 working days

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it. Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again.

Beyond the Internet - Unplugging the Protest Movement Wave (Paperback): Rita Figueiras, Paula do Espirito Santo Beyond the Internet - Unplugging the Protest Movement Wave (Paperback)
Rita Figueiras, Paula do Espirito Santo
R1,492 Discovery Miles 14 920 Ships in 12 - 17 working days

The western economic and financial crisis began with the collapse of Lehman Brothers in 2008 and led the European Union countries into recession. After this, governments started to implement austerity measures, such as cuts in public spending, including public subsidies and jobs, and rising prices. In this context, Europe started to experience a wave of protest movements. Individuals started to use the manifold interactive digital media environment to both fight against the austerity measures and find alternative ways of claiming their democratic rights. Inspired by the 2011 Arab Spring and the Occupy Wall Street movement in New York (USA), the Occupy LSX encampment in Central London (UK), The Outraged (Los Indignados)/ 15M encampment in Central Madrid (Spain), the Syntagma Square's Outraged movement in Athens (Greece) and the March 12th Movement in Lisbon (Portugal), although short-lived, epitomize an emerging alternative politics and participation via the media. This wave has promoted a debate on how the realm of politics is changing, as citizens broaden their ideas of what political issues and participation mean. Beyond the Internet examines the technological dimension of the recent wave of protest movements in the United Kingdom, Spain, Portugal, Greece, and Ireland. Offering an opportunity to achieve a better understanding of the dynamics between society, politics and technology, this volume questions the essentialist attributes of the Internet that fuel the techno-centric discourse. The contributors illustrate how all these protest movements were active in the social media and garnered high levels of media attention and public visibility, in spite of their failure to achieve their political goals. As intra-elite dissent was pivotal in understanding the Arab uprisings, the coalition of national ruling elites with European institutions in terms of austerity strategy is essential in understanding the limits of media/technology power and, therefore, the dissociation between communication and representative power.

Evolutionary Psychology and Digital Games - Digital Hunter-Gatherers (Hardcover): Johannes Breuer, Daniel Pietschmann, Benny... Evolutionary Psychology and Digital Games - Digital Hunter-Gatherers (Hardcover)
Johannes Breuer, Daniel Pietschmann, Benny Liebold, Benjamin P. Lange
R4,138 Discovery Miles 41 380 Ships in 12 - 17 working days

Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.

Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover): Gilbert Held Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Gilbert Held
R4,915 Discovery Miles 49 150 Ships in 12 - 17 working days

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your

Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Hardcover): Ken... Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Hardcover)
Ken Sigler, Dan Shoemaker, Anne Kohnke
R4,440 Discovery Miles 44 400 Ships in 12 - 17 working days

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

7 Steps to Sharing Your School's Story on Social Media (Hardcover): Jason Kotch, Edward Cosentino 7 Steps to Sharing Your School's Story on Social Media (Hardcover)
Jason Kotch, Edward Cosentino
R2,817 R2,574 Discovery Miles 25 740 Save R243 (9%) Ships in 12 - 17 working days

7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.

Digital Existence - Ontology, Ethics and Transcendence in Digital Culture (Hardcover): Amanda Lagerkvist Digital Existence - Ontology, Ethics and Transcendence in Digital Culture (Hardcover)
Amanda Lagerkvist; Foreword by John Durham Peters
R4,155 Discovery Miles 41 550 Ships in 12 - 17 working days

Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover): Thomas R.... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R4,904 Discovery Miles 49 040 Ships in 12 - 17 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam. The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Security for Service Oriented Architectures (Hardcover): Walter Williams Security for Service Oriented Architectures (Hardcover)
Walter Williams
R5,207 Discovery Miles 52 070 Ships in 12 - 17 working days

Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,198 Discovery Miles 51 980 Ships in 12 - 17 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Technocrime and Criminological Theory (Hardcover): Kevin Steinmetz, Matt R. Nobles Technocrime and Criminological Theory (Hardcover)
Kevin Steinmetz, Matt R. Nobles
R6,082 Discovery Miles 60 820 Ships in 12 - 17 working days

Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist theory, social learning theory, and postmodernism, this text paves the way for those who seek to tackle the most pertinent areas in technocrime. Technocrime and Criminological Theory challenges readers to confront the conflicts, gaps, and questions faced by both scholars and practitioners in the field. This book serves as an ideal primer for scholars beginning to study technocrime or as a companion for graduate level courses in technocrime or deviance studies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Financial Regulation and Technology - A…
Iain Sheridan Paperback R2,728 Discovery Miles 27 280
Artificial Intelligence and the Media…
Taina Pihlajarinne, Anette Alen-Savikko Hardcover R3,369 Discovery Miles 33 690
Financial Regulation and Technology - A…
Iain Sheridan Hardcover R3,986 Discovery Miles 39 860
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R343 Discovery Miles 3 430
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Game Boy: The Box Art Collection
Bitmap Books Hardcover R1,181 Discovery Miles 11 810
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,809 Discovery Miles 58 090
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,483 Discovery Miles 64 830

 

Partners