0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (125)
  • R250 - R500 (454)
  • R500+ (1,356)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Buffering - Unshared Tales of a Life Fully Loaded (Paperback): Hannah Hart Buffering - Unshared Tales of a Life Fully Loaded (Paperback)
Hannah Hart
R260 R145 Discovery Miles 1 450 Save R115 (44%) Ships in 10 - 15 working days

By combing through the journals that Hannah has kept for much of her life, this collection of narrative essays deliver a fuller picture of her life, her experiences, and the things she's figured out about family, faith, love, sexuality, self-worth, friendship and fame. Revealing what makes Hannah tick, this sometimes cringe-worthy, poignant collection of stories is sure to deliver plenty of Hannah's wit and wisdom, and hopefully encourage you to try your hand at her patented brand of reckless optimism. Personal note: Hello, my darlings! I am incredibly pleased to present BUFFERING: Unshared Tales of a Life Fully Loaded! As a big fan of memoirs, I wanted to try my hand at writing about the events of my life that deserve a little more consideration than can be accomplished in 140-characters or a 6-minute vlog. Now on the cusp of turning 30, I'm ready to expose some parts of my life that I haven't shared before. Before, it was all about privacy, process and time. And now the time has come! I'm ready to put myself out there, for you. I'm a little nervous about all these vulnerable words going into the world, these tales about my love life, the wrestling I've done with faith, how I feel about sex and my family and myself. I've had a lot of trials, a lot of errors, but also a lot of passion. Here's the thing - I've always found comfort in the stories shared by others, so I hope my stories, now that I feel ready to tell them, will bring you some comfort too. And when you read this book please remember: Buffering is just the time it takes to process. Enjoy! Love, Hannah

The Bloomsbury Handbook of Electronic Literature (Hardcover): Joseph Tabbi The Bloomsbury Handbook of Electronic Literature (Hardcover)
Joseph Tabbi
R5,309 Discovery Miles 53 090 Ships in 10 - 15 working days

Winner of the 2017 N. Katherine Hayles Award for Criticism of Electronic Literature A CHOICE Outstanding Academic Title 2018 The digital age has had a profound impact on literary culture, with new technologies opening up opportunities for new forms of literary art from hyperfiction to multi-media poetry and narrative-driven games. Bringing together leading scholars and artists from across the world, The Bloomsbury Handbook of Electronic Literature is the first authoritative reference handbook to the field. Crossing disciplinary boundaries, this book explores the foundational theories of the field, contemporary artistic practices, debates and controversies surrounding such key concepts as canonicity, world systems, narrative and the digital humanities, and historical developments and new media contexts of contemporary electronic literature. Including guides to major publications in the field, The Bloomsbury Handbook of Electronic Literature is an essential resource for scholars of contemporary culture in the digital era.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,394 Discovery Miles 13 940 Ships in 10 - 15 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

Legal Principles for Combatting Cyberlaundering (Hardcover, 2014): Daniel Adeoye Leslie Legal Principles for Combatting Cyberlaundering (Hardcover, 2014)
Daniel Adeoye Leslie
R4,464 Discovery Miles 44 640 Ships in 10 - 15 working days

This volume deals with the very novel issue of cyber laundering. The book investigates the problem of cyber laundering legally and sets out why it is of a grave legal concern locally and internationally. The book looks at the current state of laws and how they do not fully come to grips with the problem. As a growing practice in these modern times, and manifesting through technological innovations, cyber laundering is the birth child of money laundering and cybercrime. It concerns how the internet is used for 'washing' illicit proceeds of crime. In addition to exploring the meaning and ambits of the problem with concrete real-life examples, more importantly, a substantial part of the work innovates ways in which the dilemma can be curbed legally.

This volume delves into a very grey area of law, daring a yet unthreaded territory and scouring undiscovered paths where money laundering, cybercrime, information technology and international law converge. In addition to unearthing such complexity, the hallmark of this book is in the innovative solutions and dynamic remedies it postulates.

Shaping Internet Governance: Regulatory Challenges (Hardcover, 2010 ed.): Rolf H. Weber Shaping Internet Governance: Regulatory Challenges (Hardcover, 2010 ed.)
Rolf H. Weber
R2,824 Discovery Miles 28 240 Ships in 18 - 22 working days

The information society is a key issue in everyday life and a phenomenon enc- passing social, cultural, economic, and legal facettes. Currently, an information society's legal framework is gradually crystallizing under the newly introduced term of "Internet governance." During the last few years, intensive discussions about the contents of Internet governance have addressed manifold aspects of a possible regulatory regime. In light of the general comprehension that an international treaty structure is mi- ing and that self-regulation as a normative model does not sufce in all respects, new architectural and constitutional theories have been developed; furthermore, the international body of the Internet Governance Forum (IGF) came to life. N- withstanding the available literature on IGF, however, a thorough and systematic study sheding light on the main topics of Internet governance (such as legitimacy, transparency, accountability, and participation) and on the key regulatory issues (for example critical Internet resources, access, protection of civil liberties/- man rights, realization of security, safety and privacy standards, as well as the overcoming of the digital divide) from a legal perspective is not yet at hand. The present publication aims at discussing these legal challenges. This book has benefted from many inputs and encouragements from colleagues that I am deeply grateful for. In particular, I am indebted to the very meaningful discussions and valuable support in the preparation of the publication by my - search assistants lic. iur Mirin . a Grosz and lic. iurR . omana Weber, to lic. iur.

You're On Mute - 101 Tips to Add Zip to your Zoom (Paperback): Jo Hoare You're On Mute - 101 Tips to Add Zip to your Zoom (Paperback)
Jo Hoare
R197 R177 Discovery Miles 1 770 Save R20 (10%) Ships in 9 - 17 working days

With 101 tips explaining the dos and don'ts of virtual meetings, delivered with abundant humour, You're On Mute will help you master video calls in "the new normal." If life on Zoom is getting you down and you're dreading the next inevitable invite to a Teams meeting, don't panic, help is at hand. Whether you need to stop doing that weird wave at the end of meetings or want to break the habit of being transfixed by your own face in the corner of the screen, the fun advice inside this book has got you covered. Advice includes: Mastering online etiquette - from the right way to say hello to the right time to hang up How to make multi-generational family video calls workable for both grandparents and children ("You're still on mute, grandma!") Ensuring your next video quiz is an entertaining test of knowledge rather than a painful test of endurance Best practices for work-related video calls, from being sensitive to camera-shy coworkers to the ideal backdrop for a job interview Successfully navigating an online romance, covering first dates to long-term relationships Avoiding the "must not dos" of video calls, whether it's the serious matter of security or the shame of surprise screen sharing In no time you'll be living your best life online, bringing your A game to any virtual work meeting, catch-up with family, quiz with friends, online date and more.

Asset Protection and Security Management Handbook (Hardcover): James Walsh Asset Protection and Security Management Handbook (Hardcover)
James Walsh
R4,121 Discovery Miles 41 210 Ships in 10 - 15 working days

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

Feminism, Writing and the Media in Spain - Ana Maria Matute, Rosa Montero and Lucia Etxebarria (Paperback, New edition): Mazal... Feminism, Writing and the Media in Spain - Ana Maria Matute, Rosa Montero and Lucia Etxebarria (Paperback, New edition)
Mazal Oaknin
R1,436 Discovery Miles 14 360 Ships in 10 - 15 working days

This book explores the different treatment of writing by women and writing by men in twenty-first-century Spain. Focusing on contemporary Spanish authors Ana Maria Matute (1926-2014), Rosa Montero (1952-), and Lucia Etxebarria (1966-), the author examines how Spanish women writers are marketed in Spain and, in particular, how current marketing strategies reinforce traditional structures of femininity. Through an analysis of their work and lives in the context of the Franco Regime, the Transition to democracy and contemporary Spain, this book provides an innovative study of the construction of the public personae of these key female writers. As social media and the internet transform authors' relationship with their readers, the rapidly shifting publishing industry offers an important context for the difficult balance between high levels of reception and visibility and the persistence of traditional gender stereotypes.

Multilayer Networks - Structure and Function (Paperback): Ginestra Bianconi Multilayer Networks - Structure and Function (Paperback)
Ginestra Bianconi
R1,163 Discovery Miles 11 630 Ships in 9 - 17 working days

Multilayer networks is a rising topic in Network Science which characterizes the structure and the function of complex systems formed by several interacting networks. Multilayer networks research has been propelled forward by the wide realm of applications in social, biological and infrastructure networks and the large availability of network data, as well as by the significance of recent results, which have produced important advances in this rapidly growing field. This book presents a comprehensive account of this emerging field. It provides a theoretical introduction to the main results of multilayer network science.

Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality (Hardcover): Emilia Simao, Celia Soares Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality (Hardcover)
Emilia Simao, Celia Soares
R4,603 Discovery Miles 46 030 Ships in 18 - 22 working days

The concept of immersive multimedia, which is closely related to concepts of augmented reality, brings opportunities in art, education, entertainment, and technology. As such, it is vital to explore the connections between consumers of media content and information parts that come from multimedia platforms. Trends, Experiences, and Perspectives in Immersive Multimedia and Augmented Reality is a critical scholarly resource that offers solutions to the problems that appear in both theoretical and practical dimensions of immersive multimedia experiences on an interdisciplinary platform. Featuring coverage on a broad range of topics such as cyber behavior, human-computer interaction, and transmedia, this book is geared towards digital artists, media professionals, developers, academicians, researchers, and upper-level graduate students seeking current research on the exploration of immersive multimedia through the perspectives of technology, communications, and art.

Digital Storytelling - Form and Content (Hardcover, 1st ed. 2017): Mark Dunford, Tricia Jenkins Digital Storytelling - Form and Content (Hardcover, 1st ed. 2017)
Mark Dunford, Tricia Jenkins
R3,722 Discovery Miles 37 220 Ships in 9 - 17 working days

This edited collection brings together academics and practitioners to explore the uses of Digital Storytelling, which places the greatest possible emphasis on the voice of the storyteller. Case studies are used as a platform to investigate questions of concept, theory and practice, and to shine an interrogative light on this emergent form of participatory media. The collection examines the creative and academic roots of Digital Storytelling before drawing on a range of international examples to consider the way in which the practice has established itself and evolved in different settings across the world.

The Dictionary of Multimedia 1999 - Terms and Acronyms (Hardcover, 2nd edition): Brad Hansen The Dictionary of Multimedia 1999 - Terms and Acronyms (Hardcover, 2nd edition)
Brad Hansen
R3,554 Discovery Miles 35 540 Ships in 10 - 15 working days

Multimedia, which may be defined as interactive digital media, is a synthesis of traditional forms of art and communication with the rapidly-evolving fields of computing and networking. A variety of technical and social/cultural disciplines are involved: audio, graphic, hardware, human factors, networking, software, telecommunications, and video. A large and often incomprehensible vocabulary has resulted from the convergence of these diverse disciplines.

Comprehensive, concise and clearly written, The Dictionary of Multimedia presents and defines the "language" that has resulted from this convergence -- from A: B: C notation to z-sorting. Industry-standard acronyms are also spelled out and defined. Extended definitions of important concepts such as MIDI Fire Wire, and MPEG are included.

Features of the new Second Edition include: more than 4,000 terms (50% more than in the 1998 edition); additional illustrations and graphic examples; in-depth treatment of Internet technologies: XML, HTML 4.0, JavaScript; new standards: MPEG-2 and other video codecs, DVD, VRML, Dolby Audio; new bus architectures and operating systems; updated treatment of the latest hardware; JAVA programming references; etc.

Handbook of Research on Effective Advertising Strategies in the Social Media Age (Hardcover): Nurdan OEncel Taskiran, Recep... Handbook of Research on Effective Advertising Strategies in the Social Media Age (Hardcover)
Nurdan OEncel Taskiran, Recep Yilmaz
R8,363 Discovery Miles 83 630 Ships in 18 - 22 working days

Social media pervades people's awareness and everyday lives while also influencing societal and cultural patterns. In response to the social media age, advertising agents are creating new strategies that best suit changing consumer relationships. The Handbook of Research on Effective Advertising Strategies in the Social Media Age focuses on the radically evolving field of advertising within the new media environment. Covering new strategies, structural transformation of media, and changing advertising ethics, this book is a timely publication for policymakers, government officials, academicians, researchers, and school practitioners interested in furthering their research exposure and analyzing the rapidly evolving advertising sector and its reflection on social media.

CyberBRICS - Cybersecurity Regulations in the BRICS Countries (Hardcover, 1st ed. 2021): Luca Belli CyberBRICS - Cybersecurity Regulations in the BRICS Countries (Hardcover, 1st ed. 2021)
Luca Belli
R3,673 Discovery Miles 36 730 Ships in 10 - 15 working days

This book stems from the CyberBRICS project, which is the first major attempt to produce a comparative analysis of Internet regulations in the BRICS countries - namely, Brazil, Russia, India, China, and South Africa. The project has three main objectives: 1) to map existing regulations; 2) to identify best practices; and 3) to develop policy recommendations in the various areas that compose cybersecurity governance, with a particular focus on the strategies adopted by the BRICS countries to date. Each study covers five essential dimensions of cybersecurity: data protection, consumer protection, cybercrime, the preservation of public order, and cyberdefense. The BRICS countries were selected not only for their size and growing economic and geopolitical relevance but also because, over the next decade, projected Internet growth is expected to occur predominantly in these countries. Consequently, the technology, policy and governance arrangements defined by the BRICS countries are likely to impact not only the 3.2 billion people living in them, but also the individuals and businesses that choose to utilize increasingly popular applications and services developed in BRICS countries according to BRICS standards. Researchers, regulators, start-up innovators and other Internet stakeholders will find this book a valuable guide to the inner workings of key cyber policies in this rapidly growing region.

Australian Feminist Campaigning - Celanthropy, Online Activism and Celebrity Feminism (Hardcover, New edition): Sarah Casey Australian Feminist Campaigning - Celanthropy, Online Activism and Celebrity Feminism (Hardcover, New edition)
Sarah Casey
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days
Young People, Social Media and Health (Hardcover): Victoria Goodyear, Kathleen Armour Young People, Social Media and Health (Hardcover)
Victoria Goodyear, Kathleen Armour
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

The book is relevant for various regions including the US, UK, Australia, Western European nations and New Zealand. Key informants offer insights for policy and practice. Rich theoretical analysis further contextualizes findings and provides analysis to advance the field.

Evolutionary Psychology and Digital Games - Digital Hunter-Gatherers (Hardcover): Johannes Breuer, Daniel Pietschmann, Benny... Evolutionary Psychology and Digital Games - Digital Hunter-Gatherers (Hardcover)
Johannes Breuer, Daniel Pietschmann, Benny Liebold, Benjamin P. Lange
R4,492 Discovery Miles 44 920 Ships in 10 - 15 working days

Evolutionary Psychology and Digital Games: Digital Hunter-Gatherers is the first edited volume that systematically applies evolutionary psychology to the study of the use and effects of digital games. The book is divided into four parts: Theories and Methods Emotion and Morality Social Interaction Learning and Motivation These topics reflect the main areas of digital games research as well as some of the basic categories of psychological research. The book is meant as a resource for researchers and graduate students in psychology, anthropology, media studies and communication as well as video game designers who are interested in learning more about the evolutionary roots of player behaviors and experiences.

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,807 Discovery Miles 18 070 Ships in 10 - 15 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Intellectual Property Rights and Emerging Technology - 3D Printing in China (Hardcover): Hing Kai Chan, Hui Leng Choo, Onyeka... Intellectual Property Rights and Emerging Technology - 3D Printing in China (Hardcover)
Hing Kai Chan, Hui Leng Choo, Onyeka Osuji, James Griffin
R4,488 Discovery Miles 44 880 Ships in 10 - 15 working days

3D printing poses many challenges to the traditional law of intellectual property (IP). This book develops a technical method to help overcome some of these legal challenges and difficulties. This is a collection of materials from empirical interviews, workshops and publications that have been carried out in one of the world's leading research projects into the legal impact of 3D printing. The project was designed to establish what legal challenges 3D printing companies thought they faced, and having done that, to establish a technical framework for a solution.

Digital Existence - Ontology, Ethics and Transcendence in Digital Culture (Hardcover): Amanda Lagerkvist Digital Existence - Ontology, Ethics and Transcendence in Digital Culture (Hardcover)
Amanda Lagerkvist; Foreword by John Durham Peters
R4,507 Discovery Miles 45 070 Ships in 10 - 15 working days

Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes 'ontology,' 'ethics' and 'transcendence,' it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture - and digital religion in particular - beyond 'religion,' to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.

Intellectual Property in Consumer Electronics, Software and Technology Startups (Hardcover, 2014 ed.): Gerald B. Halt, Jr.,... Intellectual Property in Consumer Electronics, Software and Technology Startups (Hardcover, 2014 ed.)
Gerald B. Halt, Jr., John C. Donch, Jr., Amber R. Stiles, Robert Fesnak
R4,008 Discovery Miles 40 080 Ships in 10 - 15 working days

This book provides a comprehensive guide to procuring, utilizing and monetizing intellectual property rights, tailored for readers in the high-tech consumer electronics and software industries, as well as technology startups. Numerous, real examples, case studies and scenarios are incorporated throughout the book to illustrate the topics discussed. Readers will learn what to consider throughout the various creative phases of a product's lifespan from initial research and development initiatives through post-production. Readers will gain an understanding of the intellectual property protections afforded to U.S. corporations, methods to pro-actively reduce potential problems, and guidelines for future considerations to reduce legal spending, prevent IP theft, and allow for greater profitability from corporate innovation and inventiveness.

Practical Hacking Techniques and Countermeasures (Hardcover): Mark D Spivey Practical Hacking Techniques and Countermeasures (Hardcover)
Mark D Spivey
R5,053 Discovery Miles 50 530 Ships in 10 - 15 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Personal Style Blogs - Appearances that Fascinate (Paperback): Rosie Findlay Personal Style Blogs - Appearances that Fascinate (Paperback)
Rosie Findlay
R848 Discovery Miles 8 480 Ships in 10 - 15 working days

From Style Rookie to Style Bubble, personal style blogs exploded onto the scene in the mid-2000s giving voice to young and stylish writers who had their own unique take on the seasonal fashion cycle and how to curate an individual style within the shifting swirl of trends. Personal Style Blogs examines the history and rise of style blogging and looks closely at the relationship between bloggers and their (often anonymous) readers as well as the response of the fashion industry to style bloggers' amateur and often unauthorized fashion reportage. The book charts the development of the style blogosphere and its transformation from an alternative, experimental space to one dominated by the fashion industry. Complete with examples of several famous fashion bloggers, such as Susie Lau, Rumi Neely and Tavi Gevinson, the author explores notions of individuality, aesthetics and performance on both sides of the digital platform. Findlay asks: what can style blogging teach us about women's writing and the performance of a private self online? And what drives style bloggers to carve a space for themselves online?

Software Test Attacks to Break Mobile and Embedded Devices (Hardcover): Jon Duncan Hagar Software Test Attacks to Break Mobile and Embedded Devices (Hardcover)
Jon Duncan Hagar
R5,505 Discovery Miles 55 050 Ships in 10 - 15 working days

Address Errors before Users Find ThemUsing a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of "smart" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.

Information Security Management Handbook - Volume IV (Hardcover): Harold Tipton Information Security Management Handbook - Volume IV (Hardcover)
Harold Tipton
R12,082 Discovery Miles 120 820 Ships in 10 - 15 working days

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference. The changes in the technology of information security and the increasing threats to security make a complete and up-to-date understanding of this material essential. Volume 4 supplements the information in the earlier volumes of this handbook, updating it and keeping it current. Organized by the ten domains of the Common Body of Knowledge (CBK) on which the CISSP exam is based, this volume gives you the information you need to understand what makes information secure and how to secure it. Because the knowledge required to master information security - the CBK - is growing so quickly, there is little duplication of material among the four volumes. As a study guide or resource that you can use on the job, the Information Security Management Handbook, Fourth Edition, Volume 4 is the book you will refer to over and over again.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Being Spiritual but Not Religious…
William B. Parsons Hardcover R4,496 Discovery Miles 44 960
Quality in Online Programs - Approaches…
Swapna Kumar, Patricia Arnold Hardcover R3,993 Discovery Miles 39 930
Silver Threads - 25 Years of…
Beverly Kane, Jean Millay, … Hardcover R2,817 R2,552 Discovery Miles 25 520
Mobile Services for Toy Computing
Patrick C K Hung Hardcover R3,595 R1,843 Discovery Miles 18 430
Research Anthology on Digital…
Information Reso Management Association Hardcover R21,626 Discovery Miles 216 260
The Theory of Canonical Moments with…
H Dette Hardcover R4,969 Discovery Miles 49 690
Trends, Paradigms, and Advances in…
Mohamed Arezki Mellal Hardcover R5,565 Discovery Miles 55 650
The Greatest Yoga Tips In The World
David Gellineau, David Robson DVD R307 R222 Discovery Miles 2 220
Successful Fundraising for the Academic…
Kathryn Dilworth, Laura Henzl Paperback R1,455 Discovery Miles 14 550
Statistical Mechanics - An Introduction
D.H. Trevena Paperback R982 Discovery Miles 9 820

 

Partners