0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (182)
  • R250 - R500 (603)
  • R500+ (5,304)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Cyber Self-Defense - Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying (Paperback): Alexis Moore,... Cyber Self-Defense - Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying (Paperback)
Alexis Moore, Laurie Edwards
R358 Discovery Miles 3 580 Ships in 10 - 15 working days

According to the U.S .Department of Justice, more than six million people are stalked each year in the United States alone. Don't become one of them International cybercrime expert Alexis Moore can help protect you from the spurned lovers, angry neighbors, and jealous coworkers who use the Internet as the perfect way to exact revenge and wreak havoc on your life. In her essential book, she introduces the ten most common personality profiles of cyberstalkers--such as Attention-Getting, Jealous, Manipulative, Controlling, and Narcissistic--and their threatening online behaviors. Each chapter includes a quiz to help you identify the signs of that personality type in order to determine if you are in a potentially vulnerable relationship. Case studies illustrate how that particular cybercriminal operates, and Moore offers tips to prevent and/or recover from each type of cybercrime. She also provides strategies to help victims protect themselves, reestablish their reputations and credentials, recover from financial losses, and rebuild their lives. The techniques range from recovering data, monitoring online profiles and social media information, and regaining self-esteem to changing identities and even going underground.

Multimedia Forensics (Hardcover, 1st ed. 2022): Husrev Taha Sencar, Luisa Verdoliva, Nasir Memon Multimedia Forensics (Hardcover, 1st ed. 2022)
Husrev Taha Sencar, Luisa Verdoliva, Nasir Memon
R1,695 Discovery Miles 16 950 Ships in 10 - 15 working days

This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field.

A Practical Introduction to Enterprise Network and Security Management (Paperback, 3rd Edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 3rd Edition)
Bongsik Shin
R927 Discovery Miles 9 270 Ships with 15 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective.

Because of the critical importance of cybersecurity in today’s enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading.

This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter.

FEATURES

Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity

Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP

Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice

Explains subjects in a systematic and practical manner to facilitate understanding

Includes practical exercise questions that can be individual or group assignments within or without a classroom

Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning

The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Table of Contents

1. Networking: Fundamental Concepts

2. Cybersecurity: Fundamentals

3. Essential Layers of Computer Networking

4. IP Address Planning and Management

5. Intermediary Devices

6. Wi-Fi and Cellular Network

7. Ethernet LAN

8. Cybersecurity: Threats

9. Cybersecurity: Network and Host Protection

10. Cybersecurity: Data Protection

11. Fundamentals of Packet Routing

12. Wide Area Network

13. Physical Layer Data Transmissions

Essentials of Blockchain Technology (Paperback): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Paperback)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R1,490 Discovery Miles 14 900 Ships in 10 - 15 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Secure Edge Computing - Applications, Techniques and Challenges (Hardcover): Mohiuddin Ahmed, Paul Haskell-Dowland Secure Edge Computing - Applications, Techniques and Challenges (Hardcover)
Mohiuddin Ahmed, Paul Haskell-Dowland
R3,137 Discovery Miles 31 370 Ships in 10 - 15 working days

This book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. The book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.

Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover):... Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover)
Bruce Turner
R2,116 Discovery Miles 21 160 Ships in 10 - 15 working days

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Campus Emergency Preparedness - Meeting ICS and NIMS Compliance (Paperback): Maureen Connolly Campus Emergency Preparedness - Meeting ICS and NIMS Compliance (Paperback)
Maureen Connolly
R1,140 Discovery Miles 11 400 Ships in 10 - 15 working days

An easily digestible guide, Campus Emergency Preparedness: Meeting ICS and NIMS Compliance helps you develop and organize emergency operation plans. It incorporates the key components recommended by the Federal Emergency Management Agency (FEMA) and the US Department of Education and outlines the roles and responsibilities of campus personnel before, during, and after an emergency. Events covered include chemical spills, toxic gas releases, terrorist attacks, active shooter events, pandemics, floods, hurricanes, tornados, fires, and other natural or man-made hazards. The information in this book is extracted from FEMA and US Department of Education documents and training, as well as concepts and strategies from a cross-section of college and university emergency plans. These resources have been melded together to provide you with strategies for protecting, preventing, mitigating, responding, and recovering from threats and hazards that may occur at an institute of higher education. The book aids you in creating emergency response plans that comply with standards set by the ICS and NIMS. Ultimately, these are all-hazards strategies that can be applied to all phases of campus emergency management with efficient coordination among all levels of campus administration. Safety in higher education institution campuses is a critical issue today in the wake of several events in recent years. Campus Emergency Preparedness helps you work toward creating a campus environment that is as safe as possible for your students, faculty, and staff. It is a valuable source for anticipating and handling a broad range of emergencies.

Artificial Intelligence in a Throughput Model - Some Major Algorithms (Paperback): Waymond Rodgers Artificial Intelligence in a Throughput Model - Some Major Algorithms (Paperback)
Waymond Rodgers
R2,274 Discovery Miles 22 740 Ships in 10 - 15 working days

Physical and behavioral biometric technologies such as fingerprinting, facial recognition, voice identification, etc. have enhanced the level of security substantially in recent years. Governments and corporates have employed these technologies to achieve better customer satisfaction. However, biometrics faces major challenges in reducing criminal, terrorist activities and electronic frauds, especially in choosing appropriate decision-making algorithms. To face this challenge, new developments have been made, that amalgamate biometrics with artificial intelligence (AI) in decision-making modeling. Advanced software algorithms of AI, processing information offered by biometric technology, achieve better results. This has led to growth in the biometrics technology industry, and is set to increase the security and internal control operations manifold. This book provides an overview of the existing biometric technologies, decision-making algorithms and the growth opportunity in biometrics. The book proposes a throughput model, which draws on computer science, economics and psychology to model perceptual, informational sources, judgmental processes and decision choice algorithms. It reviews how biometrics might be applied to reduce risks to individuals and organizations, especially when dealing with digital-based media.

Intelligence Management - Knowledge Driven Frameworks for Combating Terrorism and Organized Crime (Hardcover, Edition.): Babak... Intelligence Management - Knowledge Driven Frameworks for Combating Terrorism and Organized Crime (Hardcover, Edition.)
Babak Akhgar, Simeon Yates
R2,890 Discovery Miles 28 900 Ships in 10 - 15 working days

The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime. The chapters address the linkage between: law enforcement; developments in information and communication technologies and key ideas about the management of data, information, knowledge and intelligence. The work is conducted by a number of international academic and industrial research groups, law enforcement agencies, and end users. Section 1 presents four chapters that address the details, outcomes, user needs and background theoretical ideas behind a large-scale research aand development project in this domain (The Odyssey Project). This project explored the challenges of establishing a Pan-European ballistics and crime information intelligence network. It represents an example of the type of system that is likely to become commonly used by Law Enforcement Agencies in the near future. Many of the challenges are not technical but organisational, legal, economic, social and political. Sections 2 and 3 therefore present wider commentaries. Section 2 explores other research and development projects that attempt to exploit the power of contemporary ICT systems to support Law Enforcement Agencies in many aspects of their work including investigations, data analysis and presentation, identification, training and crime prevention. Section 3 takes a look at the social and organisational issues around aspects of crime prevention, crime detection and policing - with a view to the role of information and communication technologies in these contexts.

Cyber Security and IT Infrastructure Protection (Paperback, New): John Vacca Cyber Security and IT Infrastructure Protection (Paperback, New)
John Vacca
R1,098 Discovery Miles 10 980 Ships in 10 - 15 working days

This book serves as a security practitioner s guide to today s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.

Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.

Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding Chapter Review Questions/Exercises and Case Studies Ancillaries: Solutions Manual; slide package; figure files

This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions"

Managing Information Security (Paperback, 2nd edition): John Vacca Managing Information Security (Paperback, 2nd edition)
John Vacca
R1,099 Discovery Miles 10 990 Ships in 10 - 15 working days

"Managing Information Security" offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise.
Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere elseComprehensive coverage by leading experts allows the reader to put current technologies to workPresents methods of analysis and problem solving techniques, enhancing the reader s grasp of the material and ability to implement practical solutions"

Artificial Intelligence for Business Optimization - Research and Applications (Hardcover): Bhuvan Unhelkar, Tad Gonsalves Artificial Intelligence for Business Optimization - Research and Applications (Hardcover)
Bhuvan Unhelkar, Tad Gonsalves
R2,604 Discovery Miles 26 040 Ships in 10 - 15 working days

This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit. By considering business strategies, business process modeling, quality assurance, cybersecurity, governance and big data and focusing on functions, processes, and people's behaviors it helps businesses take a truly holistic approach to business optimization. It contains practical examples that make it easy to understand the concepts and apply them. It is written for practitioners (consultants, senior executives, decision-makers) dealing with real-life business problems on a daily basis, who are keen to develop systematic strategies for the application of AI/ML/BD technologies to business automation and optimization, as well as researchers who want to explore the industrial applications of AI and higher-level students.

The Cybersecurity Self-Help Guide (Paperback): Arun Soni The Cybersecurity Self-Help Guide (Paperback)
Arun Soni
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

Computing Technologies and Applications - Paving Path Towards Society 5.0 (Hardcover): Latesh Malik, Sandhya Arora, Urmila... Computing Technologies and Applications - Paving Path Towards Society 5.0 (Hardcover)
Latesh Malik, Sandhya Arora, Urmila Shrawankar, Maya Ingle, Indu Bhagat
R4,497 Discovery Miles 44 970 Ships in 10 - 15 working days

1) Make use of digital technology for social care services is the major responsibility of computing domain. Social care services require attention for health care, old age person and disables. Thus the book focuses on suggesting software solutions for supporting societal issues such as health care, support system for old age citizens, learning and monitoring mythology for disables and also technical solutions for better living. It is considered that technology is enabling people so that they could access to advances and so that there could be benefits in the health and technology 2) Interdisciplinary computing can be applicable to all the ranges. It would remove barriers to cooperation. This book would be helpful to undergraduate, post graduate and researchers. This course is offered in many universities in US, UK etc. Interdisciplinary studies are emerging as both necessary and expedient in the academy. Hence there would be a demand for such a book. This book would also help improve computational thinking to 'understand and change the world'. It will be a link between computing and variety of other fields. 3) There are several books available on computing which either focus on programming or basics of assistive technology, online social interactions, or general topics of information science in the market currently. However, none of the available books which covers the use of recent technologies to solve real life societal problems. This book not only focuses the computing technologies, basic theories, challenges, and implementation but also covers case studies. It focuses on core theories, architectures, and technologies necessary to develop and understand the computing models and its applications. The book also has the high potential to be used as recommended textbook for research scholars and post-graduate programs.

Practitioner's Guide to Business Impact Analysis (Paperback): Priti Sikdar Practitioner's Guide to Business Impact Analysis (Paperback)
Priti Sikdar
R1,354 Discovery Miles 13 540 Ships in 10 - 15 working days

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists and flow diagrams that give the roadmap to collect, collate and analyze data, and give enterprise management the entire mapping for controls that comprehensively covers all compliance that the enterprise is subject to have. The book helps professionals build a control framework tailored for an enterprise that covers best practices and relevant standards applicable to the enterprise. Presents a practical approach to assessing security, performance and business continuity needs of the enterprise Helps readers understand common objectives for audit, compliance, internal/external audit and assurance. Demonstrates how to build a customized controls framework that fulfills common audit criteria, business resilience needs and internal monitoring for effectiveness of controls Presents an Integrated Audit approach to fulfill all compliance requirements

Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Paperback): James Bone Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Paperback)
James Bone
R1,311 Discovery Miles 13 110 Ships in 10 - 15 working days

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback): Abu Sayed Mahfuz Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback)
Abu Sayed Mahfuz
R1,338 Discovery Miles 13 380 Ships in 10 - 15 working days

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software. The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. It covers the major areas of software management, software life cycle, and life cycle processes. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. It also examines what a tester or test lead needs to do before and during test execution and how to report after completing the test execution. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit. This section also discusses the definition, measurement, and metrics of reliability based on standards and quality metrics methodology CMM models. It discusses the ISO 15504 standard, CMMs, PSP, and TSP and includes an appendix containing a software process improvement sample document.

Digital Twin Technology (Paperback): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Paperback)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R1,459 Discovery Miles 14 590 Ships in 10 - 15 working days
The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Hardcover):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Hardcover)
Te Wu
R4,341 Discovery Miles 43 410 Ships in 10 - 15 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

Inside Radio: An Attack and Defense Guide (Hardcover, 1st ed. 2018): Qing Yang, Lin Huang Inside Radio: An Attack and Defense Guide (Hardcover, 1st ed. 2018)
Qing Yang, Lin Huang
R2,690 Discovery Miles 26 900 Ships in 10 - 15 working days

This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.

The Art of Algorithm Design (Hardcover): Sachi Nandan Mohanty, Pabitra Kumar Tripathy, Suneeta Satpathy The Art of Algorithm Design (Hardcover)
Sachi Nandan Mohanty, Pabitra Kumar Tripathy, Suneeta Satpathy
R4,510 Discovery Miles 45 100 Ships in 10 - 15 working days

Understand the introductory concepts and design principles of algorithms and their complexities. Demonstrate the programming implementations of all the algorithms using C-Language. Be an excellent handbook on algorithms with self-explanatory chapters enriched with problems and solutions.

X-Ways Forensics Practitioner's Guide (Paperback, New): Brett Shavers, Eric Zimmerman X-Ways Forensics Practitioner's Guide (Paperback, New)
Brett Shavers, Eric Zimmerman
R1,350 Discovery Miles 13 500 Ships in 10 - 15 working days

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis.

In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches.

With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documented features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
Provides detailed explanations of the complete forensic investigation processe using X-Ways Forensics.Goes beyond the basics: hands-on case demonstrations of never-before-documented features of X-Ways.Provides the best resource of hands-on information to use X-Ways Forensics.

Computer Network Security and Cyber Ethics (Paperback, 4th Revised edition): Joseph Migga Kizza Computer Network Security and Cyber Ethics (Paperback, 4th Revised edition)
Joseph Migga Kizza
R1,004 R721 Discovery Miles 7 210 Save R283 (28%) Ships in 10 - 15 working days

Cyber vandalism and identity theft represent enormous threats in a computer-driven world. This timely work focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring. This edition explores security issues also in the world of social networks. General security protocols and best practices have been updated to reflect changes in the cyber world, and the changing business information security landscape is analysed in detail.

Blockchain and IoT Integration - Approaches and Applications (Hardcover): Kavita Saini Blockchain and IoT Integration - Approaches and Applications (Hardcover)
Kavita Saini
R3,132 Discovery Miles 31 320 Ships in 10 - 15 working days

As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems

Cybersecurity Lessons from CoVID-19 (Hardcover): Robert Slade Cybersecurity Lessons from CoVID-19 (Hardcover)
Robert Slade
R1,565 Discovery Miles 15 650 Ships in 10 - 15 working days

Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business. Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book. Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Safari Nation - A Social History Of The…
Jacob Dlamini Paperback R330 R305 Discovery Miles 3 050
Conflict, Cultural Heritage and Peace…
Colin Breen Paperback R1,283 Discovery Miles 12 830
Africa's Wild Dogs - A Survival Story
Jocelin Kagan Hardcover R855 R749 Discovery Miles 7 490
Civil War and Uncivil Development…
David Maher Hardcover R2,894 Discovery Miles 28 940
The New Knowledge Economy in Europe - A…
Maria Joao Rodrigues Hardcover R4,035 Discovery Miles 40 350
Autonomous Navigation and Deployment of…
AV Savkin Hardcover R3,132 Discovery Miles 31 320
Public Economics
E. Calitz, K. Siebrits Paperback R677 Discovery Miles 6 770
Autonomous Vehicles - Technologies…
George Dimitrakopoulos, Aggelos Tsakanikas, … Paperback R2,670 Discovery Miles 26 700
Armed Conflicts in South Asia 2011 - The…
D Suba Chandran, P.R. Chari Hardcover R4,641 Discovery Miles 46 410
The POLITICAL ECONOMY OF DIVERSITY…
Robert Delorme, Kurt Dopfer Hardcover R3,885 Discovery Miles 38 850

 

Partners