0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (604)
  • R500+ (5,313)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback): Babak Akhgar,... Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback)
Babak Akhgar, Gregory B Saathoff, Hamid R Arabnia, Richard Hill, Andrew Staniforth, …
R1,465 Discovery Miles 14 650 Ships in 12 - 19 working days

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security

Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback): Parisa Dr. Naraei,... Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback)
Parisa Dr. Naraei, I.S. Dr. Amiri, Iman Dr. Saberi
R1,344 Discovery Miles 13 440 Ships in 12 - 19 working days

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.

Securing VoIP - Keeping Your VoIP Network Safe (Paperback): Regis J. Jr (Bud) Bates Securing VoIP - Keeping Your VoIP Network Safe (Paperback)
Regis J. Jr (Bud) Bates
R1,091 Discovery Miles 10 910 Ships in 12 - 19 working days

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

Next Generation Wireless Network Security and Privacy (Hardcover): Kamaljit I Lakhtaria Next Generation Wireless Network Security and Privacy (Hardcover)
Kamaljit I Lakhtaria
R5,562 Discovery Miles 55 620 Ships in 10 - 15 working days

As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.

Cybersecurity Data Science - Best Practices in an Emerging Profession (Hardcover, 1st ed. 2021): Scott Mongeau, Andrzej... Cybersecurity Data Science - Best Practices in an Emerging Profession (Hardcover, 1st ed. 2021)
Scott Mongeau, Andrzej Hajdasinski
R4,259 Discovery Miles 42 590 Ships in 12 - 19 working days

This book encompasses a systematic exploration of Cybersecurity Data Science (CSDS) as an emerging profession, focusing on current versus idealized practice. This book also analyzes challenges facing the emerging CSDS profession, diagnoses key gaps, and prescribes treatments to facilitate advancement. Grounded in the management of information systems (MIS) discipline, insights derive from literature analysis and interviews with 50 global CSDS practitioners. CSDS as a diagnostic process grounded in the scientific method is emphasized throughout Cybersecurity Data Science (CSDS) is a rapidly evolving discipline which applies data science methods to cybersecurity challenges. CSDS reflects the rising interest in applying data-focused statistical, analytical, and machine learning-driven methods to address growing security gaps. This book offers a systematic assessment of the developing domain. Advocacy is provided to strengthen professional rigor and best practices in the emerging CSDS profession. This book will be of interest to a range of professionals associated with cybersecurity and data science, spanning practitioner, commercial, public sector, and academic domains. Best practices framed will be of interest to CSDS practitioners, security professionals, risk management stewards, and institutional stakeholders. Organizational and industry perspectives will be of interest to cybersecurity analysts, managers, planners, strategists, and regulators. Research professionals and academics are presented with a systematic analysis of the CSDS field, including an overview of the state of the art, a structured evaluation of key challenges, recommended best practices, and an extensive bibliography.

TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R970 R875 Discovery Miles 8 750 Save R95 (10%) Ships in 10 - 15 working days
Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover): Mohammad Shahid Husain, Mohammad Zunnun Khan Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover)
Mohammad Shahid Husain, Mohammad Zunnun Khan
R6,685 Discovery Miles 66 850 Ships in 10 - 15 working days

Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.

Blockchain: Empowering Digital Economy (Hardcover): Yang Yan, Bin Wang, Jun Zou Blockchain: Empowering Digital Economy (Hardcover)
Yang Yan, Bin Wang, Jun Zou
R2,326 Discovery Miles 23 260 Ships in 10 - 15 working days

Big data has been upgraded to our national strategy and has become a catalyst for national and local economic development. With the further promotion of big data and artificial intelligence (AI), the new business model needs to optimize and upgrade. The integration of the blockchain industry will fully implement the digital China strategy and promote the application of big data in China.This unique compendium gives a comprehensive understanding of the blockchain content through the path of technological innovation. It enables readers to fully understand the role of blockchain in promoting the digital economy.The volume will be a useful reference guide for relevant personnel in state ministries and commissions, state-owned enterprises, big data, AI, as well as teachers, researchers and students in higher education institutions.

Computer and Network Security (Hardcover): Jaydip Sen Computer and Network Security (Hardcover)
Jaydip Sen
R3,333 Discovery Miles 33 330 Ships in 10 - 15 working days
The Myth Of Security - Hackers' Inventions Will Win The Race for Information (Hardcover): Niels Starling The Myth Of Security - Hackers' Inventions Will Win The Race for Information (Hardcover)
Niels Starling
R750 Discovery Miles 7 500 Ships in 10 - 15 working days
Data Governance Success - Growing and Sustaining Data Governance (Hardcover, 1st ed. 2021): Rupa Mahanti Data Governance Success - Growing and Sustaining Data Governance (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,352 Discovery Miles 23 520 Ships in 12 - 19 working days

While good data is an enterprise asset, bad data is an enterprise liability. Data governance enables you to effectively and proactively manage data assets throughout the enterprise by providing guidance in the form of policies, standards, processes and rules and defining roles and responsibilities outlining who will do what, with respect to data. While implementing data governance is not rocket science, it is not a simple exercise. There is a lot confusion around what data governance is, and a lot of challenges in the implementation of data governance. Data governance is not a project or a one-off exercise but a journey that involves a significant amount of effort, time and investment and cultural change and a number of factors to take into consideration to achieve and sustain data governance success. Data Governance Success: Growing and Sustaining Data Governance is the third and final book in the Data Governance series and discusses the following: * Data governance perceptions and challenges * Key considerations when implementing data governance to achieve and sustain success* Strategy and data governance* Different data governance maturity frameworks* Data governance - people and process elements* Data governance metrics This book shares the combined knowledge related to data and data governance that the author has gained over the years of working in different industrial and research programs and projects associated with data, processes, and technologies and unique perspectives of Thought Leaders and Data Experts through Interviews conducted. This book will be highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge to support and succeed in data governance implementations. This book is technology agnostic and contains a balance of concepts and examples and illustrations making it easy for the readers to understand and relate to their own specific data projects.

Surveillance and Threat Detection - Prevention versus Mitigation (Hardcover, New): Richard Kirchner Surveillance and Threat Detection - Prevention versus Mitigation (Hardcover, New)
Richard Kirchner
R2,087 R1,453 Discovery Miles 14 530 Save R634 (30%) Ships in 12 - 19 working days

"Surveillance and Threat Detection" offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs.

Readers of "Surveillance and Threat Detection" will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.
Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attackUnderstand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection programAccess a full ancillary package, including instructor's manual, test banks, and student study exams

Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Hardcover, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R4,233 Discovery Miles 42 330 Ships in 12 - 19 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Sensemaking for Security (Hardcover, 1st ed. 2021): Anthony J. Masys Sensemaking for Security (Hardcover, 1st ed. 2021)
Anthony J. Masys
R4,244 Discovery Miles 42 440 Ships in 12 - 19 working days

This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes' and 'wicked problems' that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences. Sensemaking is the activity that enables us to turn the ongoing complexity of the world into a "situation that is comprehended explicitly in words and that serves as a springboard into action" (Weick, Sutcliffe, Obstfeld, 2005). It is about creating an emerging picture of our world through data collection, analysis, action, and reflection. The importance of sensemaking to security is that it enables us to plan, design and act when the world as we knew it seems to have shifted. Leveraging the relevant theoretical grounding and thought leadership in sensemaking, key examples are provided, thereby illustrating how sensemaking strategies can support security planning and design. This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape. This book is useful for academics, graduate students in global security, and government and security planning practitioners.

The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback): PL Wylie The Pentester BluePrint - Starting a Career as an Ethical Hacker (Paperback)
PL Wylie
R636 Discovery Miles 6 360 Ships in 12 - 19 working days

JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R11,205 Discovery Miles 112 050 Ships in 10 - 15 working days
Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback): Michael Cross Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback)
Michael Cross
R1,185 Discovery Miles 11 850 Ships in 12 - 19 working days

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
Defines an organization's goals for social networkingPresents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security"

Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New): Josh More Job Reconnaissance - Using Hacking Skills to Win the Job Hunt Game (Paperback, New)
Josh More
R652 Discovery Miles 6 520 Ships in 12 - 19 working days

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. "

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game "explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the entire job hunt process from when to decide to leave your current job, research new possible job opportunities, targeting your new boss, controlling the job interview process and negotiating your new compensation and the departure from your current job.

This is not a complete all-in-one job-hunting book. This book assumes that the reader is reasonably competent and has already heard most of the "standard" advice, but is having difficulty putting the advice into practice. The goal is to fill in the gaps of the other books and to help the readers use their technical skills to their advantage in a different context.

The emphasis in "Job Reconnaissance "is for infosec and IT job seekers to leverage the same skills they use in penetration testing and recon toward job-hunting success. These skills include targeting, reconnaissance and profiling combined with a technical look at skills other career search bookscommonly miss.
Covers the entire job hunt process from when to decide to leave your current job to the departure of your current jobSuggests how to research new possible job opportunitiesShows how to target your new boss, controlling the job interview process and negotiating your new compensation "

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New): Danda B. Rawat, Bhed... Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications (Hardcover, New)
Danda B. Rawat, Bhed B. Bista, Gongjun Yan
R5,477 Discovery Miles 54 770 Ships in 10 - 15 working days

While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks and will serve as a reference for graduate students, professors, and researchers in this emerging field.

Practical Anonymity - Hiding in Plain Sight Online (Paperback): Pete Loshin Practical Anonymity - Hiding in Plain Sight Online (Paperback)
Pete Loshin
R656 Discovery Miles 6 560 Ships in 12 - 19 working days

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be left alone in your online life. "Practical Anonymity: Hiding in Plain Sight Online "shows you how to use the most effective and widely-used anonymity tools--the ones that protect diplomats, military and other government agencies to become invisible online. This "practical "guide skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible.

For many, using any of the open-source, peer-reviewed tools for connecting to the Internet via an anonymous network may be (or seem to be) too difficult becausemost of the information about these tools is burdened with discussions of how they work and how to maximize security. Even tech-savvy users may find the burden too great--but actually using the tools can be pretty simple.

The primary market for this book consists of IT professionals who need/want tools for anonymity to test/work around corporate firewalls and router filtering as well as provide anonymity tools to their customers.

Simple, step-by-step instructions for configuring and using anonymous networking software Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats and concrete suggestions for appropriate responses Easy-to-follow tips for safer computing
Simple, step-by-step instructions for configuring and using anonymous networking software Use of open source, time-proven and peer-reviewed tools for anonymity Plain-language discussion of actual threats, and concrete suggestions for appropriate responses Easy to follow tips for safer computing. "

Network and System Security (Paperback, 2nd edition): John Vacca Network and System Security (Paperback, 2nd edition)
John Vacca
R1,366 Discovery Miles 13 660 Ships in 12 - 19 working days

"Network and System Security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.
Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhereComprehensive and updated coverage of the subject area allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

Research Anthology on Combating Denial-of-Service Attacks (Hardcover): Information Resources Management Association Research Anthology on Combating Denial-of-Service Attacks (Hardcover)
Information Resources Management Association
R10,795 Discovery Miles 107 950 Ships in 10 - 15 working days

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers. Research Anthology on Combating Denial-of-Service Attacks examines the latest research on the development of intrusion detection systems and best practices for preventing and combatting cyber-attacks intended to disrupt business and user experience. Highlighting a range of topics such as network administration, application-layer protocols, and malware detection, this publication is an ideal reference source for cybersecurity professionals, IT specialists, policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Windows 2012 Server Network Security - Securing Your Windows Network Systems and Infrastructure (Paperback): Derrick Rountree Windows 2012 Server Network Security - Securing Your Windows Network Systems and Infrastructure (Paperback)
Derrick Rountree
R1,038 Discovery Miles 10 380 Ships in 12 - 19 working days

"Windows 2012 Server Network Security "provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting

Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. "Windows 2012 Server Network Security "provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.
Provides practical examples of how to secure your Windows network. Focuses specifically on Windows network security rather than general concepts. One of the first books to cover WindowsServer 2012network security. "

Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover): S. Srinivasan Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments (Hardcover)
S. Srinivasan
R5,345 Discovery Miles 53 450 Ships in 10 - 15 working days

Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.

Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New): Josh More Assessing Vendors - A Hands-On Guide to Assessing Infosec and IT Vendors (Paperback, New)
Josh More
R642 Discovery Miles 6 420 Ships in 12 - 19 working days

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. "

Assessing Vendors "shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price
Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,654 Discovery Miles 86 540
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,362 Discovery Miles 13 620
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340

 

Partners