0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (146)
  • R250 - R500 (515)
  • R500+ (1,497)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Information Wars - How We Lost the Global Battle Against Disinformation and What We Can Do about It (Paperback): Richard Stengel Information Wars - How We Lost the Global Battle Against Disinformation and What We Can Do about It (Paperback)
Richard Stengel
R483 R421 Discovery Miles 4 210 Save R62 (13%) Ships in 10 - 15 working days

Disinformation is as old as humanity. When Satan told Eve nothing would happen if she bit the apple, that was disinformation. But the rise of social media has made disinformation even more pervasive and pernicious in our current era. In a disturbing turn of events, governments are increasingly using disinformation to create their own false narratives, and democracies are proving not to be very good at fighting it. During the final three years of the Obama administration, Richard Stengel, the former editor of Time and an Under Secretary of State, was on the front lines of this new global information war. At the time, he was the single person in government tasked with unpacking, disproving, and combating both ISIS's messaging and Russian disinformation. Then, in 2016, as the presidential election unfolded, Stengel watched as Donald Trump used disinformation himself, weaponizing the grievances of Americans who felt left out by modernism. In fact, Stengel quickly came to see how all three players had used the same playbook: ISIS sought to make Islam great again; Putin tried to make Russia great again; and we all know about Trump. In a narrative that is by turns dramatic and eye-opening, Information Wars walks readers through of this often frustrating battle. Stengel moves through Russia and Ukraine, Saudi Arabia and Iraq, and introduces characters from Putin to Hillary Clinton, John Kerry and Mohamed bin Salman to show how disinformation is impacting our global society. He illustrates how ISIS terrorized the world using social media, and how the Russians launched a tsunami of disinformation around the annexation of Crimea - a scheme that became the model for their interference with the 2016 presidential election. An urgent book for our times, Information Wars stresses that we must find a way to combat this ever growing threat to democracy.

So You've Landed in a Fantasy World - How to Survive and Thrive (Paperback): Josiah Lebowitz So You've Landed in a Fantasy World - How to Survive and Thrive (Paperback)
Josiah Lebowitz
R475 Discovery Miles 4 750 Ships in 12 - 17 working days

Today, it seems as if everyone from heroic-yet-angsty teenagers, to giggling schoolgirls, to middle-aged businessmen, to bored moms are finding themselves whisked away to save distant worlds from some kind of unspeakable evil. But how do you prepare for such an amazing adventure? And, more importantly, how do you make it through without getting horribly maimed or killed along the way? Fortunately, this handbook has analyzed the accounts of numerous heroes who have traveled to magical lands and returned to tell the tale in order to create the definitive guide to survival and success no matter where in the fantasyverse your adventures may take you. In these pages, you'll learn how to increase (or, if you prefer, decrease) your chances of successfully being chosen, what types of preparation and training you should undertake beforehand, and how to hit the ground running on arrival and become the legendary hero that you were always destined to be.**Makes no guarantees of destined heroism and cannot be held liable if it turns out that you are instead destined to be eaten by a giant toad.

Entrepreneurial journalism in greater China and Southeast Asia - Case Studies and Tools for Media Professionals (Hardcover):... Entrepreneurial journalism in greater China and Southeast Asia - Case Studies and Tools for Media Professionals (Hardcover)
Judith Clarke
R4,076 Discovery Miles 40 760 Ships in 12 - 17 working days

Exploring startup journalism and digital media platform trends in China, Taiwan and Southeast Asia, this book offers a practical insight into how to launch and run successful news operations as digitisation spreads through the region. Drawing from a range of case studies of news and journalism startups, including Malaysiakini, Hong Kong Free Press, The News Lens of Taiwan, Thailand's The Standard, Ciwei Gongshe of China, Indonesia's IDN Media, Sabay of Cambodia and Frontier Myanmar, this book provides tips on how to launch a news media startup, how to find funding and how to sustain and scale the enterprise. Blending a theoretical approach with core business and newsgathering expertise, the author offers an engaging overview of contemporary entrepreneurial concepts and their vital relationship in finding new markets for journalism today. Entrepreneurial journalism in greater China and Southeast Asia is an invaluable resource for both students and professionals interested in new media, startups and the Asian media market.

Entrepreneurial journalism in greater China and Southeast Asia - Case Studies and Tools for Media Professionals (Paperback):... Entrepreneurial journalism in greater China and Southeast Asia - Case Studies and Tools for Media Professionals (Paperback)
Judith Clarke
R1,063 Discovery Miles 10 630 Ships in 12 - 17 working days

Exploring startup journalism and digital media platform trends in China, Taiwan and Southeast Asia, this book offers a practical insight into how to launch and run successful news operations as digitisation spreads through the region. Drawing from a range of case studies of news and journalism startups, including Malaysiakini, Hong Kong Free Press, The News Lens of Taiwan, Thailand's The Standard, Ciwei Gongshe of China, Indonesia's IDN Media, Sabay of Cambodia and Frontier Myanmar, this book provides tips on how to launch a news media startup, how to find funding and how to sustain and scale the enterprise. Blending a theoretical approach with core business and newsgathering expertise, the author offers an engaging overview of contemporary entrepreneurial concepts and their vital relationship in finding new markets for journalism today. Entrepreneurial journalism in greater China and Southeast Asia is an invaluable resource for both students and professionals interested in new media, startups and the Asian media market.

Strong Security Governance through Integration and Automation - A Practical Guide to Building an Integrated GRC Framework for... Strong Security Governance through Integration and Automation - A Practical Guide to Building an Integrated GRC Framework for Your Organization (Hardcover)
Priti Sikdar
R2,017 Discovery Miles 20 170 Ships in 12 - 17 working days

This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the compliances. It sets a unique mechanism for monitoring controls and a dashboard to maintain the level of compliances. It aims at integration and automation to reduce the fatigue of frequent compliance audits and build a standard baseline of controls to comply with the applicable standards and regulations to which the organization is subject. It is a perfect reference book for professionals in the field of IT governance, risk management, and compliance. The book also illustrates the concepts with charts, checklists, and flow diagrams to enable management to map controls with compliances.

Understanding Reddit (Hardcover): Elliot T. Panek Understanding Reddit (Hardcover)
Elliot T. Panek
R1,552 Discovery Miles 15 520 Ships in 12 - 17 working days

This book offers a comprehensive scholarly overview of Reddit, one of the most popular and least studied social platforms of the early 21st century. The book inspires new ways of thinking about Reddit, considering it from multiple perspectives: through a historical lens, as a site where identity is forged, as a democracy, as a community, and as a news aggregator and distributor. By bringing theories from computer-mediated communication, communication studies, and sociology to bear on original, large-scale observational analyses of Reddit's communities, this book provides a uniquely comprehensive overview of the platform's first 15 years. Understanding Reddit will help us make sense of how rapidly growing communities function in an era of mass online anonymity. Serving both as a primer on how social behavior on Reddit plays out, and as a way of locating it within multiple theoretical traditions, the book will offer important insights to scholars and students in the disciplines of communication, media studies, information science, internet and emerging media studies, and sociology.

Use and Misuse of New Technologies - Contemporary Challenges in International and European Law (Hardcover, 1st ed. 2019): Elena... Use and Misuse of New Technologies - Contemporary Challenges in International and European Law (Hardcover, 1st ed. 2019)
Elena Carpanelli, Nicole Lazzerini
R5,255 Discovery Miles 52 550 Ships in 10 - 15 working days

The ever-increasing use of technology is challenging the current status of the law, bringing about new problems and questions. The book addresses this trend from the perspective of International law and European Union law and is divided into three main thematic sections. The first section focuses on the legal implications of the use of technology either for law enforcement purposes or in the context of military activities, and examines how this use adds a new dimension to perennial issues, such as the uneasy balance between security concerns and the protection of individual rights, and defining the exact scope of certain State obligations. In so doing, it takes into account a range of current and potential scenarios at the international, regional and domestic level, including the use of killer robots, databases, drones and technology in general to patrol borders, exchange information on criminal suspects, maintain public order, target suspected terrorists and conduct military activities. In turn, the second section examines the role of institutional and non-institutional actors in establishing substantive normative standards for the use of high-tech applications. In this respect, it focuses both on the role that European courts have played so far, and on how other actors' initiatives can contribute to the construction of a new legal framework for technology-related activities. Lastly, the third section has a two-fold focus: the first part investigates how the increasing reliance on technology is affecting traditional rules on international responsibility, and is challenging, in particular, the attribution of wrongful conduct to States and international organizations. The second part addresses issues of jurisdiction and justiciability. Given the scope of its coverage, this timely book addresses an important lacuna in the current legal scholarship, exploring some of the most recent applications of technology and the legal issues arising as a result. Readers will gain novel insights into the challenges posed to International law and European law by the growing reliance on technology, taking into account both its uses and misuses.

The Patentability of Software - Software as Mathematics (Paperback): Anton Hughes The Patentability of Software - Software as Mathematics (Paperback)
Anton Hughes
R1,273 Discovery Miles 12 730 Ships in 12 - 17 working days

This book explores the question of whether software should be patented. It analyses the ways in which the courts of the US, the EU, and Australia have attempted to deal with the problems surrounding the patentability of software and describes why it is that the software patent issue should be dealt with as a patentable subject matter issue, rather than as an issue of novelty or nonobviousness. Anton Hughes demonstrates that the current approach has failed and that a fresh approach to the software patent problem is needed. The book goes on to argue against the patentability of software based on its close relationship to mathematics. Drawing on historical and philosophical accounts of mathematics in pursuit of a better understanding of its nature and focusing the debate on the conditions necessary for mathematical advancement, the author puts forward an analytical framework centred around the concept of the useful arts. This analysis both explains mathematics', and therefore software's, nonpatentability and offers a theory of patentable subject matter consistent with Australian, American, and European patent law.

Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Paperback): Sara Smyth Biometrics, Surveillance and the Law - Societies of Restricted Access, Discipline and Control (Paperback)
Sara Smyth
R1,270 Discovery Miles 12 700 Ships in 12 - 17 working days

The use of biometric identification systems is rapidly increasing across the world, owing to their potential to combat terrorism, fraud, corruption and other illegal activities. However, critics of the technology complain that the creation of an extensive central register of personal information controlled by the government will increase opportunities for the state to abuse citizens. There is also concern about the extent to which data about an individual is recorded and kept. This book reviews some of the most current and complex legal and ethical issues relating to the use of biometrics. Beginning with an overview of biometric systems, the book goes on to examine some of the theoretical underpinnings of the surveillance state, questioning whether these conceptual approaches are still relevant, particularly the integration of ubiquitous surveillance systems and devices. The book also analyses the implementation of the world's largest biometric database, Aadhaar, in detail. Additionally, the identification of individuals at border checkpoints in the United States, Australia and the EU is explored, as well as the legal and ethical debates surrounding the use of biometrics regarding: the war on terror and the current refugee crisis; violations of international human rights law principles; and mobility and privacy rights. The book concludes by addressing the collection, use and disclosure of personal information by private-sector entities such as Axciom and Facebook, and government use of these tools to profile individuals. By examining the major legal and ethical issues surrounding the debate on this rapidly emerging technology, this book will appeal to students and scholars of law, criminology and surveillance studies, as well as law enforcement and criminal law practitioners.

Network Forensics - Privacy and Security (Hardcover): Anchit Bijalwan Network Forensics - Privacy and Security (Hardcover)
Anchit Bijalwan
R3,844 R3,646 Discovery Miles 36 460 Save R198 (5%) Ships in 12 - 17 working days

This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know - how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security, all kind of network attacks, intention of an attacker, identification of attack, detection, its analysis, incident response, ethical issues, botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security, tools, Digital forensics. Differentiation among network security, computer forensics, network forensics and botnet forensics. Discussion on various cybercrimes, attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication, Computer Science and Computer Engineering.

Blockchain for Information Security and Privacy (Hardcover): Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar... Blockchain for Information Security and Privacy (Hardcover)
Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar Shukla, Zelalem Sintayehu Shibeshi
R3,039 Discovery Miles 30 390 Ships in 12 - 17 working days

Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

How To Be a Geek - Essays on Software Culture (Paperback): Fuller How To Be a Geek - Essays on Software Culture (Paperback)
Fuller
R543 Discovery Miles 5 430 Ships in 12 - 17 working days

Computer software and its structures, devices and processes are woven into our everyday life. Their significance is not just technical: the algorithms, programming languages, abstractions and metadata that millions of people rely on every day have far-reaching implications for the way we understand the underlying dynamics of contemporary societies. In this innovative new book, software studies theorist Matthew Fuller examines how the introduction and expansion of computational systems into areas ranging from urban planning and state surveillance to games and voting systems are transforming our understanding of politics, culture and aesthetics in the twenty-first century. Combining historical insight and a deep understanding of the technology powering modern software systems with a powerful critical perspective, this book opens up new ways of understanding the fundamental infrastructures of contemporary life, economies, entertainment and warfare. In so doing Fuller shows that everyone must learn how to be a geek , as the seemingly opaque processes and structures of modern computer and software technology have a significance that no-one can afford to ignore. This powerful and engaging book will be of interest to everyone interested in a critical understanding of the political and cultural ramifications of digital media and computing in the modern world.

Blockchain and IoT Integration - Approaches and Applications (Hardcover): Kavita Saini Blockchain and IoT Integration - Approaches and Applications (Hardcover)
Kavita Saini
R3,051 Discovery Miles 30 510 Ships in 12 - 17 working days

As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems

Coaching Online - A Practical Guide (Hardcover): Kate Anthony, DeeAnna Merz Nagel Coaching Online - A Practical Guide (Hardcover)
Kate Anthony, DeeAnna Merz Nagel
R3,914 Discovery Miles 39 140 Ships in 12 - 17 working days

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.

Rereading Marx in the Age of Digital Capitalism (Hardcover): Christian Fuchs Rereading Marx in the Age of Digital Capitalism (Hardcover)
Christian Fuchs
R2,707 Discovery Miles 27 070 Ships in 10 - 15 working days

The 'end of history' has not taken place. Ideological and economic crisis and the status quo of neoliberal capitalism since 2008 demand a renewed engagement with Marx. But if we are to effectively resist capitalism we must truly understand Marx: Marxism today must theorise how communication technologies, media representation and digitalisation have come to define contemporary capitalism. There is an urgent need for critical, Marxian-inspired knowledge as a foundation for changing the world and the way we communicate from digital capitalism towards communicative socialism and digital communism. Rereading Marx in the Age of Digital Capitalism does exactly this. Delving into Marx's most influential works, such as Capital, The Grundrisse, Economic and Philosophic Manuscripts, The German Ideology and The Communist Manifesto, Christian Fuchs draws out Marx's concepts of machinery, technology, communication and ideology, all of which anticipate major themes of the digital age. A concise and coherent work of Marxist media and communication theory, the book ultimately demonstrates the relevance of Marx to an age of digital and communicative capitalism.

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover)
Ann M. Butera
R1,875 Discovery Miles 18 750 Ships in 12 - 17 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

Digital Future (Paperback, New edition): Tamer Bayrak Digital Future (Paperback, New edition)
Tamer Bayrak
R2,210 Discovery Miles 22 100 Ships in 12 - 17 working days

This book contains 24 research papers by 30 expert academicians in communication science and new media technologies. Within the scope of their expertise, the contributors determine situations about today's digital society, analyze research methods, and make suggestions and observations about the digital future. Particular attention is given to digital games, artificial intelligence, digital media, digital public relations, social media, the effect of the digital on academic production process, journalism and artificial intelligence, post-pandemic cinema education, marketing and digitality, the effect of women on 3D printer technologies, media literacy and family, digital citizenship, data mining, preschool and primary school children and their relationship with technology, digital footprint, and the relationship of child audiences with semantic digital technology.

Blender For Dummies, 4th Edition (Paperback, 4th Edition): JV van Gumster Blender For Dummies, 4th Edition (Paperback, 4th Edition)
JV van Gumster
R1,014 R835 Discovery Miles 8 350 Save R179 (18%) Ships in 9 - 15 working days

Make your 3D world a reality Some of the dramatic visual effects you've seen in top-grossing movies and heralded television series got their start in Blender. This book helps you get your own start in creating three-dimensional characters, scenes, and animations in the popular free and open-source tool. Author Jason van Gumster shares his insight as an independent animator and digital artist to help Blender newcomers turn their ideas into three-dimensional drawings. From exporting and sharing scenes to becoming a part of the Blender community, this accessible book covers it all! Create 3D characters--no experience required Build scenes with texture and real lighting features Animate your creations and share them with the world Avoid common rookie mistakes This book is the ideal starting place for newcomers to the world of 3D modeling and animation.

Instagram Marketing - A Comprehensive Guide to Growing Your Brand on Instagram (Hardcover): Jason Lazar Instagram Marketing - A Comprehensive Guide to Growing Your Brand on Instagram (Hardcover)
Jason Lazar
R618 R525 Discovery Miles 5 250 Save R93 (15%) Ships in 10 - 15 working days
Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,644 Discovery Miles 16 440 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Assessing and Insuring Cybersecurity Risk (Hardcover): Ravi Das Assessing and Insuring Cybersecurity Risk (Hardcover)
Ravi Das
R4,362 Discovery Miles 43 620 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

LinkedIn Marketing - An Hour a Day (Paperback, New): Viveka von Rosen LinkedIn Marketing - An Hour a Day (Paperback, New)
Viveka von Rosen
R689 R515 Discovery Miles 5 150 Save R174 (25%) Out of stock

A step-by-step guide for succeeding on the for ''business'' social media network

"LinkedIn Marketing: An Hour a Day" helps you create, customize, and optimize a presence on LinkedIn, the world's largest social network for professionals. In this detailed, step-by-step book, LinkedIn expert Viveka von Rosen reveals how to use this powerful platform to ensure that you or your company get noticed by the right audience. Discover previously undocumented tips and tricks for community growth and management, including how to best use Groups, events, and other LinkedIn features and applications.Offers a complete resource for anyone who wants to market and recruit on the world's largest professional network Features hands-on tutorials, case studies, examples, tips, and tactics Reveals how to monitor and maintain a vibrant LinkedIn presence Includes effective tactics for recruiters, job seekers, and entrepreneurs, as well as legal, real estate, and nonprofit professionals Incorporates an exploration of the LinkedIn advertising platform, API, and mobile platform

This soup-to-nuts guidebook for tackling every stage of the LinkedIn process ensures your online presence will get noticed.

Digital Twin Technology (Hardcover): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Hardcover)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R3,051 Discovery Miles 30 510 Ships in 12 - 17 working days

Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,017 Discovery Miles 20 170 Ships in 12 - 17 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

Social Media Analytics for User Behavior Modeling - A Task Heterogeneity Perspective (Paperback): Arun Reddy Nelakurthi,... Social Media Analytics for User Behavior Modeling - A Task Heterogeneity Perspective (Paperback)
Arun Reddy Nelakurthi, Jingrui He
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

Winner of the "Outstanding Academic Title" recognition by Choice for the 2020 OAT Awards. The Choice OAT Award represents the highest caliber of scholarly titles that have been reviewed by Choice and conveys the extraordinary recognition of the academic community. In recent years social media has gained significant popularity and has become an essential medium of communication. Such user-generated content provides an excellent scenario for applying the metaphor of mining any information. Transfer learning is a research problem in machine learning that focuses on leveraging the knowledge gained while solving one problem and applying it to a different, but related problem. Features: Offers novel frameworks to study user behavior and for addressing and explaining task heterogeneity Presents a detailed study of existing research Provides convergence and complexity analysis of the frameworks Includes algorithms to implement the proposed research work Covers extensive empirical analysis Social Media Analytics for User Behavior Modeling: A Task Heterogeneity Perspective is a guide to user behavior modeling in heterogeneous settings and is of great use to the machine learning community.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
IT Contracts and Dispute Management - A…
Steven Baker, Lawrence Akka, … Hardcover R5,891 Discovery Miles 58 910
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,555 Discovery Miles 65 550
Podcasting - The Companion Handbook - A…
Steven Christianson Hardcover R547 Discovery Miles 5 470
Online Political Hate Speech in Europe…
Giovanni Ziccardi Hardcover R2,953 Discovery Miles 29 530
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R336 Discovery Miles 3 360
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi Paperback R620 R523 Discovery Miles 5 230
Handbook on Tourism and Social Media
Dogan Gursoy, Rahul P.S. Kaurav Hardcover R6,584 Discovery Miles 65 840
Financial Regulation and Technology - A…
Iain Sheridan Paperback R2,758 Discovery Miles 27 580
The Hyperlinked Life (Frames Series…
Barna Group, Jun Young, … Paperback R110 R93 Discovery Miles 930
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,249 Discovery Miles 32 490

 

Partners