0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (167)
  • R250 - R500 (528)
  • R500+ (1,485)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R4,874 Discovery Miles 48 740 Ships in 12 - 17 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover): Ann Butera Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover)
Ann Butera
R5,144 Discovery Miles 51 440 Ships in 12 - 17 working days

Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing practices. Filled with practical do and don't techniques, it encompasses the interpersonal aspects of risk-based auditing, not just the technical content.This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.The book leverages The Whole Person Project, Inc.'s 30 years of hands-on organizational development experience and custom-designed internal audit training programs to aid those just starting out in audit as well as more experienced auditors. It also contains templates you can use to set performance goals and assess your progress towards achieving those goals.This book will spark ideas that can enhance performance, improve working relationships, and make it easier to complete audits that improve your organization's risk management culture and practices. Explaining how to make positive and sustained changes to the way you approach your work, the book includes a summary of the key points and a brief quiz to help you remember salient ideas in each chapter.Presenting proven methods and advice that can help you immediately save time, reduce stress, and produce reliable, quality results, this book is an ideal resource for anyone looking to make positive changes and adopt more productive work habits

Healthcare Fraud Investigation Guidebook (Hardcover): Charles E. Piper Healthcare Fraud Investigation Guidebook (Hardcover)
Charles E. Piper
R5,278 Discovery Miles 52 780 Ships in 12 - 17 working days

Some have estimated that healthcare fraud in the United States results in losses of approximately $80 billion a year. Although there are many books available that describe how to "detect" healthcare fraud, few address what must be done after the fraud is detected. Filling this need, Charles Piper's Healthcare Fraud Investigation Guidebook details not only how to detect healthcare fraud, but also how to "investigate" and prove the wrongdoing to increase the likelihood of successful prosecution in court.The book starts by covering the history of healthcare insurance and the various types of fraud schemes. It presents Charles Piper's unique approach to investigating (The Piper Method) which allows readers to conduct as many as 10 simultaneous investigations for each case. It emphasizes the importance of simultaneously searching for waste and abuse as well as systemic weaknesses and deficiencies that caused or contributed to the problem or wrongdoing under investigation and then make recommendations for improvement. It also provides: Questions to ask whistleblowers, complainants, employers, employees, and healthcare providers who are suspects Tips on investigative case planning, goals, and strategies Sample visual aids for use when briefing others about your investigative findings Guidance on presenting information obtained from healthcare investigations and on how to testify in court Techniques for uncovering previously undetected fraud The book includes a sample case study that walks readers through a mock case from the time the case is received through the end. The case study demonstrates how to initiate, plan, and conduct a thorough and complete healthcare fraud investigation while incorporating Piper's proven methodology.Sharing insights gained through Charles Piper's decades of experience as a federal special agent and certified fraud examiner, th

Social Networking as a Criminal Enterprise (Hardcover): Catherine D. Marcum, George E. Higgins Social Networking as a Criminal Enterprise (Hardcover)
Catherine D. Marcum, George E. Higgins
R5,151 Discovery Miles 51 510 Ships in 12 - 17 working days

As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts, this book examines: The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websites Forms of criminal behavior that can be performed utilizing social networking websites Criminality via texting, identity theft, and hacking Adolescents as offenders and victims in cyberbullying and digital piracy Online sexual victimization, including child pornography and sexual solicitation of youth The book concludes by discussing law enforcement's response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders. Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system.

Physical Security and Safety - A Field Guide for the Practitioner (Hardcover): Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle Physical Security and Safety - A Field Guide for the Practitioner (Hardcover)
Truett A Ricks, Bobby E. Ricks, Jeffrey Dingle
R5,143 Discovery Miles 51 430 Ships in 12 - 17 working days

How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, protection of organizational assets, and security and safety management. Presents Vital Information on Recognizing and Understanding Security Needs The book is divided into two parts. The first half of the text, Security and Safety Planning, explores the theory and concepts of security and covers: threat decomposition, identifying security threats and vulnerabilities, protection, and risk assessment. The second half, Infrastructure Protection, examines the overall physical protection program and covers: access and perimeter control, alarm systems, response force models, and practical considerations for protecting information technology (IT). Addresses general safety concerns and specific issues covered by Occupational Safety and Health Administration (OSHA) and fire protection regulations Discusses security policies and procedures required for implementing a system and developing an attitude of effective physical security Acts as a handbook for security applications and as a reference of security considerations Physical Security and Safety: A Field Guide for the Practitioner offers relevant discourse on physical security in the workplace, and provides a guide for security, risk management, and safety professionals.

Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture... Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture (Hardcover)
Lynn Fountain
R5,017 Discovery Miles 50 170 Ships in 12 - 17 working days

This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA Standards, but the reality is that the pressure placed on internal auditors related to execution of work and upholding ethical standards can be very difficult. Regardless of best practice or theory, auditors must be personally prepared to manage through issues they run across.

Web Security - A WhiteHat Perspective (Hardcover): Hanqing Wu, Liz Zhao Web Security - A WhiteHat Perspective (Hardcover)
Hanqing Wu, Liz Zhao
R4,910 Discovery Miles 49 100 Ships in 12 - 17 working days

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R4,599 Discovery Miles 45 990 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Secure Java - For Web Application Development (Hardcover): Abhay Bhargav, B. V Kumar Secure Java - For Web Application Development (Hardcover)
Abhay Bhargav, B. V Kumar
R5,019 Discovery Miles 50 190 Ships in 12 - 17 working days

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web application development. Discussing the latest application exploits and vulnerabilities, they examine various options and protection mechanisms for securing web applications against these multifarious threats. The book is organized into four sections: Provides a clear view of the growing footprint of web applications Explores the foundations of secure web application development and the risk management process Delves into tactical web application security development with Java EE Deals extensively with security testing of web applications This complete reference includes a case study of an e-commerce company facing web application security challenges, as well as specific techniques for testing the security of web applications. Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,593 Discovery Miles 45 930 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,659 Discovery Miles 46 590 Ships in 12 - 17 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Building A Global Information Assurance Program (Hardcover): Douglas E. Campbell, Raymond J. Curts Building A Global Information Assurance Program (Hardcover)
Douglas E. Campbell, Raymond J. Curts
R4,615 Discovery Miles 46 150 Ships in 12 - 17 working days

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R4,884 Discovery Miles 48 840 Ships in 12 - 17 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Google and the Law - Empirical Approaches to Legal Aspects of Knowledge-Economy Business Models (Hardcover, 2012): Aurelio... Google and the Law - Empirical Approaches to Legal Aspects of Knowledge-Economy Business Models (Hardcover, 2012)
Aurelio Lopez-Tarruella
R2,853 Discovery Miles 28 530 Ships in 10 - 15 working days

Google's has proved to be one of the most successful business models in today's knowledge economy. Its services and applications have become part of our day-to-day life. However, Google has repeatedly been accused of acting outside the law in the development of services such as Adwords, Googlebooks or YouTube. One of the main purposes of this book is to assess whether those accusations are well-founded. But more important than that, this book provides a deeper reflection: are current legal systems adapted to business models such as that of Google or are they conceived for an industrial economy? Do the various lawsuits involving Google show an evolution of the existing legal framework that might favour the flourishing of other knowledge-economy businesses? Or do they simply reflect that Google has gone too far? What lessons can other knowledge-based businesses learn from all the disputes in which Google has been or is involved? This book is valuable reading for legal practitioners and academics in the field of information technologies and intellectual property law, economists interested in knowledge-economy business models and sociologists interested in internet and social networks. Dr. Aurelio Lopez-Tarruella is Senior Lecturer in Private International Law at the University of Alicante, Spain.

Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Paperback): Zoran S. Bojkovic, Bojan M.... Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Paperback)
Zoran S. Bojkovic, Bojan M. Bakmaz, K.R. Rao
R2,847 Discovery Miles 28 470 Ships in 12 - 17 working days

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids. Offering an accessible treatment of the latest research, this book: Presents specific wireless multimedia communication schemes that have proven to be useful Discusses important standardization processing activities regarding wireless networking Includes wireless mesh and multimedia sensor network architectures, protocols, and design optimizations Highlights the challenges associated with meeting complex connectivity requirements Contains numerous figures, tables, examples, references, and a glossary of acronyms Providing coverage of significant technological advances in their initial steps along with a survey of the fundamental principles and practices, Wireless Multimedia Communication Systems: Design, Analysis, and Implementation aids senior-level and graduate-level engineering students and practicing professionals in understanding the processes and furthering the development of today's wireless multimedia communication systems.

Data-centric Living - Algorithms, Digitization and Regulation (Paperback): V. Sridhar Data-centric Living - Algorithms, Digitization and Regulation (Paperback)
V. Sridhar
R1,146 Discovery Miles 11 460 Ships in 12 - 17 working days

This book explores how data about our everyday online behaviour are collected and how they are processed in various ways by algorithms powered by Artificial Intelligence (AI) and Machine Learning (ML). The book investigates the socioeconomic effects of these technologies, and the evolving regulatory landscape that is aiming to nurture the positive effects of these technology evolutions while at the same time curbing possible negative practices. The volume scrutinizes growing concerns on how algorithmic decisions can sometimes be biased and discriminative; how autonomous systems can possibly disrupt and impact the labour markets, resulting in job losses in several traditional sectors while creating unprecedented opportunities in others; the rapid evolution of social media that can be addictive at times resulting in associated mental health issues; and the way digital Identities are evolving around the world and their impact on provisioning of government services. The book also provides an in-depth understanding of regulations around the world to protect privacy of data subjects in the online world; a glimpse of how data is used as a digital public good in combating Covid pandemic; and how ethical standards in autonomous systems are evolving in the digital world. A timely intervention in this fast-evolving field, this book will be useful for scholars and researchers of digital humanities, business and management, internet studies, data sciences, political studies, urban sociology, law, media and cultural studies, sociology, cultural anthropology, and science and technology studies. It will also be of immense interest to the general readers seeking insights on daily digital lives.

Advances in Biometrics for Secure Human Authentication and Recognition (Paperback): Dakshina Ranjan Kisku, Phalguni Gupta,... Advances in Biometrics for Secure Human Authentication and Recognition (Paperback)
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
R1,567 Discovery Miles 15 670 Ships in 12 - 17 working days

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human authentication and recognition. Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional techniques as well as novel systems that have been developed over the past few years. It presents new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Filled with comprehensive graphical and modular illustrations, the text covers applications of affective computing in biometrics, matching sketch to photograph, cryptography approaches in biometrics, biometrics alteration, heterogeneous biometrics, and age invariant biometrics. It also presents biometrics algorithms with novel feature extraction techniques, computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Containing the work of some of the world's most respected biometrics researchers, the book includes model question papers, mathematical notations, and exercises to reinforce understanding. Providing an up-to-date review of intelligence techniques and theories used in biometric technologies for secure human authentication and identification, this is an essential reference for researchers, scholars, graduate students, engineers, practitioners, and developers in the field of biometrics and its related fields.

Facebook for Beginners in Easy Steps (Paperback): David Crookes Facebook for Beginners in Easy Steps (Paperback)
David Crookes
R343 R293 Discovery Miles 2 930 Save R50 (15%) Ships in 12 - 17 working days
100 Top Tips - Create Your Smart Home to Stay Safe and Save Money (Paperback): Nick Vandome 100 Top Tips - Create Your Smart Home to Stay Safe and Save Money (Paperback)
Nick Vandome
R147 Discovery Miles 1 470 Ships in 12 - 17 working days
Metaphors of Internet - Ways of Being in the Age of Ubiquity (Paperback, New edition): Annette N. Markham, Katrin Tiidenberg Metaphors of Internet - Ways of Being in the Age of Ubiquity (Paperback, New edition)
Annette N. Markham, Katrin Tiidenberg
R1,008 Discovery Miles 10 080 Ships in 12 - 17 working days

What happens when the internet is absorbed into everyday life? How do we make sense of something that is invisible but still so central? A group of digital culture experts address these questions in Metaphors of Internet: Ways of Being in the Age of Ubiquity. Twenty years ago, the internet was imagined as standing apart from humans. Metaphorically it was a frontier to explore, a virtual world to experiment in, an ultra-high-speed information superhighway. Many popular metaphors have fallen out of use, while new ones arise all the time. Today we speak of data lakes, clouds and AI. The essays and artwork in this book evoke the mundane, the visceral, and the transformative potential of the internet by exploring the currently dominant metaphors. Together they tell a story of kaleidoscopic diversity of how we experience the internet, offering a richly textured glimpse of how the internet has both disappeared and at the same time, has fundamentally transformed everyday social customs, work, and life, death, politics, and embodiment.

Pugtato Babysits the Snouts (Hardcover): Sophie Corrigan Pugtato Babysits the Snouts (Hardcover)
Sophie Corrigan
R405 R335 Discovery Miles 3 350 Save R70 (17%) Ships in 9 - 15 working days

What do you get when you cross imaginative and loveable characters, enchanting and inspiring illustrations and a giggle-inducing story? ...Pugtato, a simple, good spud and a hilarious mashup of pet and vegetable characters by the inimitable illustrator Sophie Corrigan! Join Pugtato as he takes on the job of babysitting the Brussels Snouts. Pugtato thinks babysitting will be easy ... how much trouble can baby Brussels Snouts get into? But as the day unfolds, the rambunctious little Snouts decide to show Pugtato they are not little babies, and prove that size doesn't matter when it comes to having lots of fun with your good spuddies. Pugtato Babysits the Snouts delivers: A delightful, giggle-inducing, rhyming, read-aloud story perfect for kids ages 4-8 Imaginative, silly pet and vegetable mashups such as Pugtato, Tomatoad, Carrat, Cowbbage, Croccoli, Unicorn on the Cob and more! A beautiful, eye-catching cover, rich with color and embossed texture Young children will learn invaluable lessons from Pugtato about: Friendship Acceptance Responsibility Creativity You'll also want to follow Pugtato's adventures in Pugtato, Let's Be Best Spuddies, Pugtato Finds a Thing, and Pugtato and Friends Audio Collection: 3 Books in 1.

My Internet for Seniors (Paperback): Michael Miller My Internet for Seniors (Paperback)
Michael Miller
R857 Discovery Miles 8 570 Ships in 12 - 17 working days

The perfect book to help anyone 50+ get the most out of the Internet--safely and securely! My Internet for Seniors helps you quickly and easily get online and start using everything the Internet has to offer. With step-by-step tasks, large text, close-up screen shots, and a custom full-color interior designed for comfortable reading, you'll quickly be getting the most out of your online experience. Top-selling author Michael Miller wrote this book from his 50+ perspective, and it covers everything you need to connect your computer, tablet, or smartphone to the Internet and start accessing websites, email, social networks, and more. Choose the right type of Internet service for your home Connect to the Internet--at home or away Choose and use the right web browser for your needs Browse and search the Web Shop safely online Use Facebook and other social media Find old friends and make new ones online Find news, sports, and weather online Enjoy TV shows, movies, and music online Get productive with online office apps Share your photos online Research your family tree online Manage your finances and track your health Play online games Email friends and family Video chat in real time Explore the mobile Internet with your tablet or smartphone Stay safe and secure while online

Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback): Ilker OEzcelik, Richard Brooks Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback)
Ilker OEzcelik, Richard Brooks
R1,881 Discovery Miles 18 810 Ships in 12 - 17 working days

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Digital Darwinism - Surviving the New Age of Business Disruption (Hardcover, 2nd Revised edition): Tom Goodwin Digital Darwinism - Surviving the New Age of Business Disruption (Hardcover, 2nd Revised edition)
Tom Goodwin
R1,439 Discovery Miles 14 390 Ships in 12 - 17 working days

Disruption is back with a vengeance. If ever there was a time to learn how to adapt, grab opportunities and bounce back - it's now. Learn how to keep your business relevant, meet new customer expectations and leverage technology. Bestselling author and business influencer Tom Goodwin is back with this entirely revised new edition of Digital Darwinism. This book guides you through the unrelenting pace of change and uncertainty facing business leaders today. Currently in a hybrid world where digital and real-world experiences collide and are expected to seamlessly blend into one another, never has the need to be on top of your digital transformation been felt more strongly. With new expectations from customers and employees alike, how will your business grow and survive the future? Learn how to become truly customer-centric, drive digital transformation through a culture of real innovation and challenge assumptions of how things have been done before. The survival of your business depends on it.

Graph-Based Social Media Analysis (Hardcover): Ioannis Pitas Graph-Based Social Media Analysis (Hardcover)
Ioannis Pitas
R2,937 Discovery Miles 29 370 Ships in 12 - 17 working days

Focused on the mathematical foundations of social media analysis, Graph-Based Social Media Analysis provides a comprehensive introduction to the use of graph analysis in the study of social and digital media. It addresses an important scientific and technological challenge, namely the confluence of graph analysis and network theory with linear algebra, digital media, machine learning, big data analysis, and signal processing. Supplying an overview of graph-based social media analysis, the book provides readers with a clear understanding of social media structure. It uses graph theory, particularly the algebraic description and analysis of graphs, in social media studies. The book emphasizes the big data aspects of social and digital media. It presents various approaches to storing vast amounts of data online and retrieving that data in real-time. It demystifies complex social media phenomena, such as information diffusion, marketing and recommendation systems in social media, and evolving systems. It also covers emerging trends, such as big data analysis and social media evolution. Describing how to conduct proper analysis of the social and digital media markets, the book provides insights into processing, storing, and visualizing big social media data and social graphs. It includes coverage of graphs in social and digital media, graph and hyper-graph fundamentals, mathematical foundations coming from linear algebra, algebraic graph analysis, graph clustering, community detection, graph matching, web search based on ranking, label propagation and diffusion in social media, graph-based pattern recognition and machine learning, graph-based pattern classification and dimensionality reduction, and much more. This book is an ideal reference for scientists and engineers working in social media and digital media production and distribution. It is also suitable for use as a textbook in undergraduate or graduate courses on digital media, social media, or social networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R350 R277 Discovery Miles 2 770
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo Paperback R639 Discovery Miles 6 390
The Cinematic Art of Overwatch: Volume 1
Hardcover R621 Discovery Miles 6 210
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,078 Discovery Miles 60 780
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo Paperback R1,471 Discovery Miles 14 710
Online Political Hate Speech in Europe…
Giovanni Ziccardi Hardcover R2,733 Discovery Miles 27 330
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,015 Discovery Miles 30 150
HealthTech - Law and Regulation
Jelena Madir Hardcover R5,350 Discovery Miles 53 500
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay Hardcover R3,302 Discovery Miles 33 020
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi Paperback R620 R546 Discovery Miles 5 460

 

Partners