0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (272)
  • R250 - R500 (606)
  • R500+ (5,289)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Security in Autonomous Driving (Hardcover): Obaid Ur-Rehman, Natasa Zivic Security in Autonomous Driving (Hardcover)
Obaid Ur-Rehman, Natasa Zivic
R3,814 Discovery Miles 38 140 Ships in 12 - 17 working days

Autonomous driving is an emerging field. Vehicles are equipped with different systems such as radar, lidar, GPS etc. that enable the vehicle to make decisions and navigate without user's input, but there are still concerns regarding safety and security. This book analyses the security needs and solutions which are beneficial to autonomous driving.

Data Mining and Machine Learning in Cybersecurity (Hardcover): Sumeet Dua, Xian Du Data Mining and Machine Learning in Cybersecurity (Hardcover)
Sumeet Dua, Xian Du
R2,481 Discovery Miles 24 810 Ships in 12 - 17 working days

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need. From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges-detailing cutting-edge machine learning and data mining techniques. It also: Unveils cutting-edge techniques for detecting new attacks Contains in-depth discussions of machine learning solutions to detection problems Categorizes methods for detecting, scanning, and profiling intrusions and anomalies Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions Details privacy-preserving data mining methods This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

Security Patch Management (Hardcover): Felicia Nicastro Security Patch Management (Hardcover)
Felicia Nicastro
R2,494 Discovery Miles 24 940 Ships in 12 - 17 working days

Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that's often left to the last minute or resolved with products that automate the task. Effective patch management is not about technology; it's about having a formal process in place that can deploy patches to vulnerable systems quickly. Helping you figure out exactly what to patch and which patches to use, Security Patch Management provides detailed guidance through the process of creating and implementing an effective and efficient patch management process. It uses a format that is easy-to-understand and applicable regardless of the operating system, network device, or patch deployment tool. The author illustrates the proper implementation of patches on devices and systems within various infrastructures to provide the insight required to: Design your own patch release process and keep it action ready Test the effectiveness of your patches Keep up with the latest patch releases Prioritize the vulnerabilities that need to be addressed Apply patches quickly and without draining essential network resources This book supplies the tools and guidelines you need to stay one step ahead of the exploits on the horizon. It will help you establish a patch management process that not only protects your organization against zero-day attacks, but also helps you become more proactive when it comes to this critical facet of information security.

Implementing SSL/TLS Using Cryptography and PKI (Paperback): J. Davies Implementing SSL/TLS Using Cryptography and PKI (Paperback)
J. Davies
R1,434 R1,096 Discovery Miles 10 960 Save R338 (24%) Ships in 12 - 17 working days

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more. Coverage includes: * Understanding Internet Security * Protecting against Eavesdroppers with Symmetric Cryptography * Secure Key Exchange over an Insecure Medium with Public Key Cryptography * Authenticating Communications Using Digital Signatures * Creating a Network of Trust Using X.509 Certificates * A Usable, Secure Communications Protocol: Client-Side TLS * Adding Server-Side TLS 1.0 Support * Advanced SSL Topics * Adding TLS 1.2 Support to Your TLS Library * Other Applications of SSL * A Binary Representation of Integers: A Primer * Installing TCPDump and OpenSSL * Understanding the Pitfalls of SSLv2 Set up and launch a working implementation of SSL with this practical guide.

Honeypots - A New Paradigm to Information Security (Hardcover): R.C. Joshi, Anjali Sardana Honeypots - A New Paradigm to Information Security (Hardcover)
R.C. Joshi, Anjali Sardana
R5,013 Discovery Miles 50 130 Ships in 12 - 17 working days

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.): Jeffrey J.P. Tsai, Zhenwei Yu Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.)
Jeffrey J.P. Tsai, Zhenwei Yu
R2,645 Discovery Miles 26 450 Ships in 12 - 17 working days

This important textbook introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.

Security Risk Models for Cyber Insurance (Hardcover): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Hardcover)
Caroline Baylon, Jose Vila, David Rios Insua
R3,457 Discovery Miles 34 570 Ships in 12 - 17 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Security and Policy Driven Computing (Hardcover, New): Lei Liu Security and Policy Driven Computing (Hardcover, New)
Lei Liu
R4,317 Discovery Miles 43 170 Ships in 12 - 17 working days

Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention. An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

Firewall Design And Analysis (Hardcover): Alex X. Liu Firewall Design And Analysis (Hardcover)
Alex X. Liu
R2,078 Discovery Miles 20 780 Ships in 12 - 17 working days

This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies.This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.

Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Paperback): Ariel Evans Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Paperback)
Ariel Evans
R1,188 Discovery Miles 11 880 Ships in 12 - 17 working days

Addresses one of the hottest issues facing all businesses today, and one that can destroy companies overnight - cybersecurity. Identifies how to implement cybersecurity strategy and practices in a straightforward way. Demystifies a crucial topic for executives, taking it away from an information technology issue and making it understandable for business leaders and board members with governance oversight. Ideal reading for executives, and also students on the growing number of courses on this topic.

31 Days Before Your CCNP and CCIE Enterprise Core Exam (Paperback): Patrick Gargano 31 Days Before Your CCNP and CCIE Enterprise Core Exam (Paperback)
Patrick Gargano
R1,452 Discovery Miles 14 520 Ships in 12 - 17 working days

31 Days Before Your CCNP and CCIE Enterprise Core Exam is the friendliest, most practical way to understand the CCNP and CCIE Enterprise certification process, commit to taking your ENCOR 350-401 exam, and finish your preparation using a variety of primary and supplemental study resources. Thoroughly updated for the current exam, this comprehensive guide offers a complete day-by-day plan for what and how to study. It covers ENCOR 350-401 enterprise network technology implementation topics including dual stack (IPv4/IPv6) architecture, virtualization, infrastructure, network assurance, security, and automation. Each day breaks down an exam topic into a short, easy-toreview summary, with Daily Study Resource quick-references pointing to deeper treatments elsewhere. Sign up for your exam now, and use this day-by-day guide and checklist to organize, prepare, review, and succeed! How this book helps you fit exam prep into your busy schedule: Visual tear-card calendar summarizes each day's study topic, to help you get through everything Checklist offers expert advice on preparation activities leading up to your exam Descriptions of exam organization and sign-up processes help make sure nothing falls between the cracks Proven strategies help you prepare mentally, organizationally, and physically Conversational tone makes studying more enjoyable Primary Resources: CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide ISBN: 978-1-5871-4523-0 CCNP and CCIE Enterprise Core ENCOR 350-401 Complete Video Course ISBN: 978-0-13-658412-4 CCNP Enterprise Advanced Routing ENARSI 300-410 Official Cert Guide ISBN: 978-1-5871-4525-4 CCNP Enterprise Advanced Routing ENARSI 300-410 Complete Video Course ISBN: 978-0-13-658289-2 CCNP Enterprise: Core Networking (ENCOR) Lab Manual v8 ISBN: 978-0-13-690643-8 CCNP Enterprise: Advanced Routing (ENARSI) Lab Manual v8 ISBN: 978-0-13-687093-7 Supplemental Resources: CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide ISBN: 978-0-13-576816-7

Security of Self-Organizing Networks - MANET, WSN, WMN, VANET (Hardcover): Al-Sakib Khan Pathan Security of Self-Organizing Networks - MANET, WSN, WMN, VANET (Hardcover)
Al-Sakib Khan Pathan
R3,524 Discovery Miles 35 240 Ships in 12 - 17 working days

Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats. Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference: 1. General Topics -- Security of Wireless and Self-Organizing Networks 2. Mobile Ad-Hoc Network and Vehicular Ad-Hoc Network Security 3. Wireless Sensor Network Security 4. Wireless Mesh Network Security Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce understanding.

Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition): Rebecca Herold Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition)
Rebecca Herold
R3,773 Discovery Miles 37 730 Ships in 12 - 17 working days

Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:

  • Lists the laws and associated excerpts of the specific passages that require training and awareness
  • Contains a plethora of forms, examples, and samples in the book's 22 appendices
  • Highlights common mistakes that many organizations make
  • Directs readers to additional resources for more specialized information
  • Includes 250 awareness activities ideas and 42 helpful tips for trainers

Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.

Praise for:

The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly..
-NoticeBored.com

Access Control, Security, and Trust - A Logical Approach (Hardcover): Shiu-Kai Chin, Susan Beth Older Access Control, Security, and Trust - A Logical Approach (Hardcover)
Shiu-Kai Chin, Susan Beth Older
R3,204 Discovery Miles 32 040 Ships in 12 - 17 working days

Developed from the authors' courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic.

The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and an introduction to confidentiality and integrity policies. The second section covers access control in networks, delegation, protocols, and the use of cryptography. In the third section, the authors focus on hardware and virtual machines. The final part discusses confidentiality, integrity, and role-based access control.

Taking a logical, rigorous approach to access control, this book shows how logic is a useful tool for analyzing security designs and spelling out the conditions upon which access control decisions depend. It is designed for computer engineers and computer scientists who are responsible for designing, implementing, and verifying secure computer and information systems.

Introduction to Privacy-Preserving Data Publishing - Concepts and Techniques (Hardcover, New): Benjamin C M Fung, Ke Wang, Ada... Introduction to Privacy-Preserving Data Publishing - Concepts and Techniques (Hardcover, New)
Benjamin C M Fung, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu
R3,768 Discovery Miles 37 680 Ships in 12 - 17 working days

Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques presents state-of-the-art information sharing and data integration methods that take into account privacy and data mining requirements.

The first part of the book discusses the fundamentals of the field. In the second part, the authors present anonymization methods for preserving information utility for specific data mining tasks. The third part examines the privacy issues, privacy models, and anonymization methods for realistic and challenging data publishing scenarios. While the first three parts focus on anonymizing relational data, the last part studies the privacy threats, privacy models, and anonymization methods for complex data, including transaction, trajectory, social network, and textual data.

This book not only explores privacy and information utility issues but also efficiency and scalability challenges. In many chapters, the authors highlight efficient and scalable methods and provide an analytical discussion to compare the strengths and weaknesses of different solutions.

Handbook Of Electronic Security And Digital Forensics (Hardcover): Hamid Jahankhani, Gianluigi Me, David Lilburn Watson, Frank... Handbook Of Electronic Security And Digital Forensics (Hardcover)
Hamid Jahankhani, Gianluigi Me, David Lilburn Watson, Frank Leonhardt
R6,028 Discovery Miles 60 280 Ships in 12 - 17 working days

The widespread use of information and communications technology (ICT) has created a global platform for the exchange of ideas, goods and services, the benefits of which are enormous. However, it has also created boundless opportunities for fraud and deception. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. It is therefore paramount that the security industry raises its game to combat these threats. Today's top priority is to use computer technology to fight computer crime, as our commonwealth is protected by firewalls rather than firepower. This is an issue of global importance as new technologies have provided a world of opportunity for criminals.This book is a compilation of the collaboration between the researchers and practitioners in the security field; and provides a comprehensive literature on current and future e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence. The intended audience includes members in academia, the public and private sectors, students and those who are interested in and will benefit from this handbook.

Colonialism and the Modernist Moment in the Early Novels of Jean Rhys (Paperback, New): Carol Dell'Amico Colonialism and the Modernist Moment in the Early Novels of Jean Rhys (Paperback, New)
Carol Dell'Amico
R1,093 R727 Discovery Miles 7 270 Save R366 (33%) Ships in 12 - 17 working days

Colonialism and the Modernist Moment in the Early Novels of Jean Rhys explores the postcolonial significance of Rhys s modernist period work, which depicts an urban scene more varied than that found in other canonical representations of the period. Arguing against the view that Rhys comes into her own as a colonial thinker only in the post-WWII period of her career, this study examines the austere insights gained by Rhys s active cultivation of her fringe status vis-a-vis British social life and artistic circles, where her sharp study of the aporias of marginal lives and the violence of imperial ideology is distilled into an artistic statement positing the outcome of the imperial venture as a state of homelessness across the board, for colonized and metropolitans alike. Bringing to view heretofore overlooked emigre populations, or their children, alongside locals, Rhys s urbanites struggle to construct secure lives not simply as a consequence of commodification, alienation, or voluntary expatriation, but also as a consequence of marginalization and migration. This view of Rhys s early work asserts its vital importance to postcolonial studies, an importance that has been overlooked owing to an over hasty critical consensus that only one of her early novels contains significant colonial content. Yet, as this study demonstrates, proper consideration of colonial elements long considered only incidental illuminates a colonial continuum in Rhys s work from her earliest publications. "

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback)
Brij B. Gupta
R1,362 Discovery Miles 13 620 Ships in 12 - 17 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Configuring Internal Controls for Software as a Service - Between Fragility and Forgiveness (Paperback): Chong Ee Configuring Internal Controls for Software as a Service - Between Fragility and Forgiveness (Paperback)
Chong Ee
R1,316 Discovery Miles 13 160 Ships in 12 - 17 working days

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective internal controls. By addressing the practitioner in the field, it provides tangible, cost effective and thus pragmatic means to mitigate key risks whilst leveraging built-in cloud capabilities and overarching principles of effective system design.

Big Data Analytics with Applications in Insider Threat Detection (Paperback): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Paperback)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R1,347 Discovery Miles 13 470 Ships in 12 - 17 working days

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Cyberspace and Cybersecurity (Paperback, 2nd edition): George Kostopoulos Cyberspace and Cybersecurity (Paperback, 2nd edition)
George Kostopoulos
R1,309 Discovery Miles 13 090 Ships in 12 - 17 working days

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback): Michael Erbschloe Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback)
Michael Erbschloe
R1,308 Discovery Miles 13 080 Ships in 12 - 17 working days

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.

A History of Cyber Security Attacks - 1980 to Present (Paperback): Bruce Middleton A History of Cyber Security Attacks - 1980 to Present (Paperback)
Bruce Middleton
R1,294 Discovery Miles 12 940 Ships in 12 - 17 working days

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

Social Media Warfare - Equal Weapons for All (Paperback): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Paperback)
Michael Erbschloe
R1,312 Discovery Miles 13 120 Ships in 12 - 17 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

The Data Protection Officer - Profession, Rules, and Role (Paperback): Paul Lambert The Data Protection Officer - Profession, Rules, and Role (Paperback)
Paul Lambert
R1,308 Discovery Miles 13 080 Ships in 12 - 17 working days

The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dark Web Pattern Recognition and Crime…
Romil Rawat, Vinod Mahor, … Hardcover R6,528 Discovery Miles 65 280
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R854 Discovery Miles 8 540
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,949 R6,257 Discovery Miles 62 570
Advancements in Security and Privacy…
Ashwani Kumar, Seelam Sai Satyanarayana Reddy Hardcover R6,253 Discovery Miles 62 530
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,284 Discovery Miles 82 840
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R12,087 Discovery Miles 120 870

 

Partners