0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (182)
  • R250 - R500 (602)
  • R500+ (5,301)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Concurrency Control And Recovery In Oltp Systems: High Scalability And Availability (Hardcover): Peng Cai, Jinwei Guo, Aoying... Concurrency Control And Recovery In Oltp Systems: High Scalability And Availability (Hardcover)
Peng Cai, Jinwei Guo, Aoying Zhou
R2,551 Discovery Miles 25 510 Ships in 10 - 15 working days

Transaction processing is fundamental for many modern applications. These applications require the backend transaction processing engines to be available at all times as well as provide a massive horizontal scale for intensive transaction requests.Concurrency Control and Recovery features recent progress in research in online transaction processing. The book also showcases the authors' research on a highly scalable OLTP system. Its contents include the designs of an efficient multiple version storage engine, a scalable range optimistic concurrency control, high-performance Paxos-based log replication, global snapshot isolation, and fast follower recovery.This book is written for professionals, researchers, and graduate students specialising in database systems and its related fields.

Confident Cyber Security - The Essential Insights and How to Protect from Threats (Hardcover, 2nd Revised edition): Jessica... Confident Cyber Security - The Essential Insights and How to Protect from Threats (Hardcover, 2nd Revised edition)
Jessica Barker
R1,830 R1,186 Discovery Miles 11 860 Save R644 (35%) Ships in 10 - 15 working days

The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident Cyber Security is here to help. From the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies including Disney, the NHS, Taylor Swift and Frank Abagnale, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. This new edition covers increasingly important topics such as deepfakes, AI and blockchain technology. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.

Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition): Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook (Paperback, 2nd edition)
Leighton Johnson
R2,280 Discovery Miles 22 800 Ships in 10 - 15 working days

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements and evaluation efforts.

Secure Data Provenance and Inference Control with Semantic Web (Paperback): Bhavani Thuraisingham, Tyrone Cadenhead, Murat... Secure Data Provenance and Inference Control with Semantic Web (Paperback)
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
R1,921 Discovery Miles 19 210 Ships in 10 - 15 working days

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.

Network Perimeter Security - Building Defense In-Depth (Hardcover): Cliff Riggs Network Perimeter Security - Building Defense In-Depth (Hardcover)
Cliff Riggs
R3,906 Discovery Miles 39 060 Ships in 10 - 15 working days

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time and budget.

Network Perimeter Security: Building Defense In-Depth reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy. It assists you in designing the security model, and outlines the testing process.

Through the concepts and case studies presented in this book, you will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection system, and other security tools and network components. This detailed volume enables you to secure your network on time, within budget, and without having to pursue attain a security certification.

Surviving Security - How to Integrate People, Process, and Technology (Hardcover, 2nd edition): Amanda Andress Surviving Security - How to Integrate People, Process, and Technology (Hardcover, 2nd edition)
Amanda Andress
R3,922 Discovery Miles 39 220 Ships in 10 - 15 working days

Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security measures such as encryption, authentication, firewalls, intrusion detection, remote access, host security, server security, and more. After reading this book, you will know how to make educated security decisions that provide airtight, reliable solutions.

About the Author
Amanda Andress, CISSP, SSCP, CPA, CISA is Founder and President of ArcSec Technologies, a firm which focuses on security product reviews and consulting. Prior to that she was Director of Security for Privada, Inc., a privacy company in San Jose, California. She built extensive security auditing and IS control experience working at Exxon and Big 5 firms Deloitte & Touche and Ernst & Young. She has been published in NetworkWorld, InfoWorld, Information Security Magazine, and others, and is a frequent presenter at industry events such as N+I and Black Hat.

Testing Code Security (Paperback): Maura A. van der Linden Testing Code Security (Paperback)
Maura A. van der Linden
R1,899 Discovery Miles 18 990 Ships in 10 - 15 working days

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.

Securing E-Business Systems - A Guide for Managers & Executives (Hardcover): T Braithwaite Securing E-Business Systems - A Guide for Managers & Executives (Hardcover)
T Braithwaite
R1,051 R831 Discovery Miles 8 310 Save R220 (21%) Ships in 10 - 15 working days

"This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation’s enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy." –John R. Thomas, Colonel, U.S. Army, Retired, Former Commander of the DoD, Global Operations and Security Center

Today’s e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts to meet a company’s changing security needs.

Topics include:

  • Security weaknesses
  • Safeguarding technologies
  • Countermeasure best practices
  • Establishing an adaptable e-business security management program
  • Essential elements of a corporate security management program
  • Functions, structure, staffing, and contracting considerations in security management
  • Implementing intrusion detection technology
  • Designing tomorrow’s e-business application for secured operations
  • Contemporary rationales for justifying increased spending on security programs
  • Emerging liability issues for e-businesses
Effective Crime Reduction Strategies - International Perspectives (Paperback): James F. Albrecht, Dilip K Das Effective Crime Reduction Strategies - International Perspectives (Paperback)
James F. Albrecht, Dilip K Das
R1,616 Discovery Miles 16 160 Ships in 10 - 15 working days

The International Police Executive Symposium (IPES, www.ipes.info) coordinates annual international conferences to evaluate critical issues in policing and recommend practical solutions to law enforcement executives deployed across the globe. Drawn from the 2005 proceedings hosted by the Czech Republic in Prague, Effective Crime Reduction Strategies: International Perspectives contains contributions from the renowned criminal justice and law enforcement professionals who gathered at this elite annual meeting. Dedicated to continued reduction in crime through local and global response, these international experts share effective crime-fighting principles and tried and proven best practices. Thoroughly revised and updated since the initial proceedings, the reports in this volume are divided into six sections which explore a host of essential topics: Critical Issues in European Law Enforcement: Highlights efforts in Hungary, Austria, and Norway to revise policies and organizational structures to meet the demands of developing events and political pressures Contemporary Concerns: Policing in the United States and Canada: Analyzes the impact of international terrorism and transnational crime on police work Paradigm Shifts: Policing as Democracy Evolves: Evaluates the success of democratic reforms in South Africa, Brazil, Argentina, Nigeria, and Cameroon Revising Traditional Law Enforcement in Asia to Meet Contemporary Demands: Describes how counterterrorism, cultural ideology, and transnational criminal influence affects the traditional nature of policing in New Zealand, Turkey, Indonesia, and Thailand The Positive Influence of Unionization on Police Professionalism: Addresses the impact of police associations on management decision-making and policy development in the United States, Canada, New Zealand, and South Africa

Asset Protection and Security Management Handbook (Hardcover): James Walsh Asset Protection and Security Management Handbook (Hardcover)
James Walsh
R4,079 Discovery Miles 40 790 Ships in 10 - 15 working days

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.

Based on the ASIS asset protection course, the text provides information vital to security planning and operational requirements. It addresses the most comonly recognized issues in the field and explores the future of asset protection management. The authors examine the latest in crime detection, prevention, and interrogation techniques. The Asset Protection and Security Management Handbook will not only help you to explore effective security training and educational programs for your organization, but will also help you discover proven methods of selling your security program to top management.

Machine Learning and Systems Engineering (Hardcover, 2010 ed.): Sio-Iong Ao, Burghard B. Rieger, Mahyar Amouzegar Machine Learning and Systems Engineering (Hardcover, 2010 ed.)
Sio-Iong Ao, Burghard B. Rieger, Mahyar Amouzegar
R5,948 Discovery Miles 59 480 Ships in 10 - 15 working days

A large international conference on Advances in Machine Learning and Systems Engineering was held in UC Berkeley, California, USA, October 20-22, 2009, under the auspices of the World Congress on Engineering and Computer Science (WCECS 2009). Machine Learning and Systems Engineering contains forty-six revised and extended research articles written by prominent researchers participating in the conference. Topics covered include Expert system, Intelligent decision making, Knowledge-based systems, Knowledge extraction, Data analysis tools, Computational biology, Optimization algorithms, Experiment designs, Complex system identification, Computational modeling, and industrial applications. Machine Learning and Systems Engineering offers the state of the art of tremendous advances in machine learning and systems engineering and also serves as an excellent reference text for researchers and graduate students, working on machine learning and systems engineering.

Disaster Survival Guide for Business Communications Networks (Paperback): Richard Grigonis Disaster Survival Guide for Business Communications Networks (Paperback)
Richard Grigonis
R2,245 Discovery Miles 22 450 Ships in 10 - 15 working days

Businesses now realize that their communications infrastructure can be crippled instantly. This work looks at technologies that both help keep connections up with the outside world and uses communications itself to prevent employees from physically getting in harms way. Topics include audio, data and videoconferencing, telecommuting, wireless communications, uninterruptible power systems, disaster planning and recovery, using both the Internet and the telephone network for voice communications, wireless LANs, and distributed systems.

Trading in Local Energy Markets and Energy Communities - Concepts, Structures and Technologies (Hardcover, 1st ed. 2023):... Trading in Local Energy Markets and Energy Communities - Concepts, Structures and Technologies (Hardcover, 1st ed. 2023)
Miadreza Shafie-Khah, Amin Shokri Gazafroudi
R4,575 Discovery Miles 45 750 Ships in 10 - 15 working days

This book presents trading in local energy markets and communities. It covers electrical, business, economics, telecommunication, information technology (IT), environment, building, industrial, and computer science and examines the intersections of these areas with these markets and communities. Additionally, it delivers an vision for local trading and communities in smart cities. Since it also lays out concepts, structures, and technologies in a variety of applications intertwined with future smart cities, readers running businesses of all types will find material of use in the book. Manufacturing firms, electric generation, transmission and distribution utilities, hardware and software computer companies, automation and control manufacturing firms, and other industries will be able to use this book to enhance their energy operations, improve their comfort and privacy, as well as to increase the benefit from the energy system. This book is also used as a textbook for graduate level courses.

Securing and Controlling Cisco Routers (Paperback): Peter T. Davis Securing and Controlling Cisco Routers (Paperback)
Peter T. Davis
R3,639 Discovery Miles 36 390 Ships in 10 - 15 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.

At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Cybersecurity Essentials (Paperback): C.J. Brooks Cybersecurity Essentials (Paperback)
C.J. Brooks
R1,100 R824 Discovery Miles 8 240 Save R276 (25%) Ships in 10 - 15 working days

An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. * Learn security and surveillance fundamentals * Secure and protect remote access and devices * Understand network topologies, protocols, and strategies * Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

CompTIA Security+ Guide to Network Security Fundamentals (Paperback, 6th edition): Mark Ciampa CompTIA Security+ Guide to Network Security Fundamentals (Paperback, 6th edition)
Mark Ciampa
R1,493 R1,393 Discovery Miles 13 930 Save R100 (7%) Ships in 10 - 15 working days

Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-501 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the sixth edition includes expanded coverage of embedded device security, attacks and defenses, and new software tools to assess security. Practical, Hands-On Projects and case activities help you put what you learn into real-world practice, while the innovative Information Security Community Site connects you to additional activities, blogs, videos, and up-to-the-minute news and insights from the information security field.

MCA Microsoft Certified Associate Azure Security E Engineer Study Guide - Exam AZ-500 (Paperback): S Brathwaite MCA Microsoft Certified Associate Azure Security E Engineer Study Guide - Exam AZ-500 (Paperback)
S Brathwaite
R1,088 Discovery Miles 10 880 Ships in 10 - 15 working days

Prepare for the MCA Azure Security Engineer certification exam faster and smarter with help from Sybex In the MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500, cybersecurity veteran Shimon Brathwaite walks you through every step you need to take to prepare for the MCA Azure Security Engineer certification exam and a career in Azure cybersecurity. You'll find coverage of every domain competency tested by the exam, including identity management and access, platform protection implementation, security operations management, and data and application security. You'll learn to maintain the security posture of an Azure environment, implement threat protection, and respond to security incident escalations. Readers will also find: Efficient and accurate coverage of every topic necessary to succeed on the MCA Azure Security Engineer exam Robust discussions of all the skills you need to hit the ground running at your first--or next--Azure cybersecurity job Complementary access to online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossary The MCA Azure Security Engineer AZ-500 exam is a challenging barrier to certification. But you can prepare confidently and quickly with this latest expert resource from Sybex. It's ideal for anyone preparing for the AZ-500 exam or seeking to step into their next role as an Azure security engineer.

802.1X Port-Based Authentication (Paperback): Edwin Lyle Brown 802.1X Port-Based Authentication (Paperback)
Edwin Lyle Brown
R1,888 Discovery Miles 18 880 Ships in 10 - 15 working days

Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today's computer networks using this particular network protocol.

Business Continuity Planning - Protecting Your Organization's Life (Hardcover): Ken Doughty Business Continuity Planning - Protecting Your Organization's Life (Hardcover)
Ken Doughty
R4,057 Discovery Miles 40 570 Ships in 10 - 15 working days

From fires, floods, and power outages to hackers and software problems, companies need to protect against a variety of threats. Business Continuity Planning takes a best practices approach to provide a comprehensive continuity solution. It details how to build a plan to handle disruptions in business, keep vital operations up and running, and prevent losses that occur when productivity is crippled or security is compromised. The book explains how to evaluate a current plan for completeness and how to monitor and maintain it to ensure it remains up-to-date.

The Right to Data Protection - Individual and Structural Dimensions of Data Protection in EU Law (Hardcover, 1st ed. 2022):... The Right to Data Protection - Individual and Structural Dimensions of Data Protection in EU Law (Hardcover, 1st ed. 2022)
Felix Bieker
R1,365 Discovery Miles 13 650 Ships in 10 - 15 working days

This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data protection under the EU Charter and its relationship to the secondary legislation. Furthermore, the case law of the Court of Justice of the EU as well as current academic conceptualizations are analysed. The author finds that current approaches invariably link data protection to privacy and often fail to address the structural implications of data processing. He therefore suggests a dualistic approach to data protection: in its individual dimension, data protection aims to protect natural persons and their rights, while the structural dimension protects the democratic society as a whole from the adverse effects of data processing. Using this approach, the full potential of an independent right to data protection can be realized. Researchers, practitioners and students will find this a valuable resource on the rationales, scope and application of data protection. Felix Bieker is Legal Researcher at the Office of the Data Protection Commissioner of Schleswig-Holstein (Unabhangiges Landeszentrum fur Datenschutz) in Kiel, Germany.

China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Hardcover): Jon R. Lindsay, Tai Ming Cheung,... China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Hardcover)
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
R3,995 Discovery Miles 39 950 Ships in 10 - 15 working days

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

Practical Data Security - Applied Information Technology (Hardcover): John Gordon Practical Data Security - Applied Information Technology (Hardcover)
John Gordon
R3,061 Discovery Miles 30 610 Ships in 10 - 15 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Security+ Guide to Network Security Fundamentals, International Edition (Paperback, International Edition): Mark Ciampa Security+ Guide to Network Security Fundamentals, International Edition (Paperback, International Edition)
Mark Ciampa
R1,466 R1,354 Discovery Miles 13 540 Save R112 (8%) Ships in 10 - 15 working days

Reflecting the latest trends and developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, International Edition, provides a complete introduction to practical network and computer security and maps to the CompTIA Security+ SY0-301 Certification Exam. The text covers the fundamentals of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and, cryptography. This updated edition includes new topics, such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. This new edition features activities that link to the Information Security Community Site, which offers video lectures, podcats, discussion boards, additional hands-on activities and more to provide a wealth of resources and up-to-the minute information.

Practical Hacking Techniques and Countermeasures (Hardcover): Mark D Spivey Practical Hacking Techniques and Countermeasures (Hardcover)
Mark D Spivey
R5,070 Discovery Miles 50 700 Ships in 10 - 15 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition): Daniel Carter CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition)
Daniel Carter
R1,013 Discovery Miles 10 130 Ships in 10 - 15 working days

This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP exam Thoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge. The book offers clear explanations of every subject on the CCSP exam and features accurate practice questions and real-world examples. New, updated, or expanded coverage includes cloud data security, DevOps security, mobile computing, threat modeling paradigms, regulatory and legal frameworks, and best practices and standards. Written by a respected computer security expert, CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition is both a powerful study tool and a valuable reference that will serve professionals long after the test. To aid in self-study, each chapter includes exam tips that highlight key information, a summary that serves as a quick review of salient points, and practice questions that allow you to test your comprehension. Special design elements throughout provide insight and call out potentially harmful situations. All practice questions match the tone, content, and format of those on the actual exam Includes access to 300 practice questions in the TotalTester (TM) Online customizable test engine Written by an IT security expert and experienced author

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R890 Discovery Miles 8 900
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R564 R524 Discovery Miles 5 240
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,432 Discovery Miles 64 320
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R2,864 Discovery Miles 28 640
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730

 

Partners