0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (595)
  • R500+ (5,134)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Paperback): Ariel Evans Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Paperback)
Ariel Evans
R1,247 Discovery Miles 12 470 Ships in 9 - 17 working days

Addresses one of the hottest issues facing all businesses today, and one that can destroy companies overnight - cybersecurity. Identifies how to implement cybersecurity strategy and practices in a straightforward way. Demystifies a crucial topic for executives, taking it away from an information technology issue and making it understandable for business leaders and board members with governance oversight. Ideal reading for executives, and also students on the growing number of courses on this topic.

Disaster Survival Guide for Business Communications Networks (Paperback): Richard Grigonis Disaster Survival Guide for Business Communications Networks (Paperback)
Richard Grigonis
R2,229 Discovery Miles 22 290 Ships in 10 - 15 working days

Businesses now realize that their communications infrastructure can be crippled instantly. This work looks at technologies that both help keep connections up with the outside world and uses communications itself to prevent employees from physically getting in harms way. Topics include audio, data and videoconferencing, telecommuting, wireless communications, uninterruptible power systems, disaster planning and recovery, using both the Internet and the telephone network for voice communications, wireless LANs, and distributed systems.

Securing and Controlling Cisco Routers (Paperback): Peter T. Davis Securing and Controlling Cisco Routers (Paperback)
Peter T. Davis
R3,708 Discovery Miles 37 080 Ships in 10 - 15 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.

At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Trading in Local Energy Markets and Energy Communities - Concepts, Structures and Technologies (Hardcover, 1st ed. 2023):... Trading in Local Energy Markets and Energy Communities - Concepts, Structures and Technologies (Hardcover, 1st ed. 2023)
Miadreza Shafie-Khah, Amin Shokri Gazafroudi
R4,306 Discovery Miles 43 060 Ships in 10 - 15 working days

This book presents trading in local energy markets and communities. It covers electrical, business, economics, telecommunication, information technology (IT), environment, building, industrial, and computer science and examines the intersections of these areas with these markets and communities. Additionally, it delivers an vision for local trading and communities in smart cities. Since it also lays out concepts, structures, and technologies in a variety of applications intertwined with future smart cities, readers running businesses of all types will find material of use in the book. Manufacturing firms, electric generation, transmission and distribution utilities, hardware and software computer companies, automation and control manufacturing firms, and other industries will be able to use this book to enhance their energy operations, improve their comfort and privacy, as well as to increase the benefit from the energy system. This book is also used as a textbook for graduate level courses.

Trends in Corrections - Interviews with Corrections Leaders Around the World, Volume Two (Paperback): Martha Henderson Hurley,... Trends in Corrections - Interviews with Corrections Leaders Around the World, Volume Two (Paperback)
Martha Henderson Hurley, Dilip K Das
R1,139 Discovery Miles 11 390 Ships in 10 - 15 working days

The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great diversity that exists cross-culturally in the political, social, and economic context of the correctional system. Presenting transcribed interviews of corrections leaders, it offered a comprehensive survey of correctional programming and management styles used across nations. The general conclusion drawn from the inaugural publication was that the correctional leaders interviewed exhibited striking similarities despite vast differences in the social and political climates in which they worked. They all appeared to struggle with some of the same issues. With a fresh set of interviews exploring further cross-cultural differences and similarities, Volume Two extends the reach to several new countries, including Slovenia, Slovakia, Northern Ireland, Switzerland, and France. The interviews are conducted by scholars or practitioners with intimate knowledge of correctional practice and who are familiar with the correctional system in the country of the interviewees. They expand the knowledge base by asking correction leaders specifically about the impact of the economic downturn on corrections in each country, the changes in correctional practice they've experienced, and how they think about and evaluate trends and developments. This revealing series affords correctional leaders an unprecedented opportunity to express their views on current practices and the future of corrections in their countries, facilitating the development of solutions to corrections challenges worldwide. This book is a volume in the Interviews with Global Leaders in Policing, Courts and Corrections series.

Effective Crime Reduction Strategies - International Perspectives (Paperback): James F. Albrecht, Dilip K Das Effective Crime Reduction Strategies - International Perspectives (Paperback)
James F. Albrecht, Dilip K Das
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

The International Police Executive Symposium (IPES, www.ipes.info) coordinates annual international conferences to evaluate critical issues in policing and recommend practical solutions to law enforcement executives deployed across the globe. Drawn from the 2005 proceedings hosted by the Czech Republic in Prague, Effective Crime Reduction Strategies: International Perspectives contains contributions from the renowned criminal justice and law enforcement professionals who gathered at this elite annual meeting. Dedicated to continued reduction in crime through local and global response, these international experts share effective crime-fighting principles and tried and proven best practices. Thoroughly revised and updated since the initial proceedings, the reports in this volume are divided into six sections which explore a host of essential topics: Critical Issues in European Law Enforcement: Highlights efforts in Hungary, Austria, and Norway to revise policies and organizational structures to meet the demands of developing events and political pressures Contemporary Concerns: Policing in the United States and Canada: Analyzes the impact of international terrorism and transnational crime on police work Paradigm Shifts: Policing as Democracy Evolves: Evaluates the success of democratic reforms in South Africa, Brazil, Argentina, Nigeria, and Cameroon Revising Traditional Law Enforcement in Asia to Meet Contemporary Demands: Describes how counterterrorism, cultural ideology, and transnational criminal influence affects the traditional nature of policing in New Zealand, Turkey, Indonesia, and Thailand The Positive Influence of Unionization on Police Professionalism: Addresses the impact of police associations on management decision-making and policy development in the United States, Canada, New Zealand, and South Africa

Police and Society in Brazil (Paperback): Vicente Riccio, Wesley G Skogan Police and Society in Brazil (Paperback)
Vicente Riccio, Wesley G Skogan
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

In Brazil, where crime is closely associated with social inequality and failure of the criminal justice system, the police are considered by most to be corrupt, inefficient, and violent, especially when occupying poor areas, and they lack the widespread legitimacy enjoyed by police forces in many nations in the northern hemisphere. This text covers hot-button issues like urban pacification squads, gangs, and drugs, as well as practical topics such as policy, dual civil and military models, and gender relations. The latest volume in the renowned Advances in Police Theory and Practice Series, Police and Society in Brazil fills a gap in English literature about policing in a nation that currently ranks sixth in number of homicides. It is a must-read for criminal justice practitioners, as well as students of international policing.

Testing Code Security (Paperback): Maura A. van der Linden Testing Code Security (Paperback)
Maura A. van der Linden
R1,875 Discovery Miles 18 750 Ships in 10 - 15 working days

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.

Secure Data Provenance and Inference Control with Semantic Web (Paperback): Bhavani Thuraisingham, Tyrone Cadenhead, Murat... Secure Data Provenance and Inference Control with Semantic Web (Paperback)
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
R1,895 Discovery Miles 18 950 Ships in 10 - 15 working days

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.

Business Continuity Planning - Protecting Your Organization's Life (Hardcover): Ken Doughty Business Continuity Planning - Protecting Your Organization's Life (Hardcover)
Ken Doughty
R4,100 Discovery Miles 41 000 Ships in 10 - 15 working days

From fires, floods, and power outages to hackers and software problems, companies need to protect against a variety of threats. Business Continuity Planning takes a best practices approach to provide a comprehensive continuity solution. It details how to build a plan to handle disruptions in business, keep vital operations up and running, and prevent losses that occur when productivity is crippled or security is compromised. The book explains how to evaluate a current plan for completeness and how to monitor and maintain it to ensure it remains up-to-date.

CompTIA Security+ Guide to Network Security Fundamentals (Paperback, 6th edition): Mark Ciampa CompTIA Security+ Guide to Network Security Fundamentals (Paperback, 6th edition)
Mark Ciampa
R1,403 R1,314 Discovery Miles 13 140 Save R89 (6%) Ships in 10 - 15 working days

Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-501 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the sixth edition includes expanded coverage of embedded device security, attacks and defenses, and new software tools to assess security. Practical, Hands-On Projects and case activities help you put what you learn into real-world practice, while the innovative Information Security Community Site connects you to additional activities, blogs, videos, and up-to-the-minute news and insights from the information security field.

China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Hardcover): Jon R. Lindsay, Tai Ming Cheung,... China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Hardcover)
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
R3,760 Discovery Miles 37 600 Ships in 10 - 15 working days

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

Professional Issues in Software Engineering (Paperback, 3rd Edition): Jack Eaton, Frank Bott, Allison Coleman, Diane Rowland Professional Issues in Software Engineering (Paperback, 3rd Edition)
Jack Eaton, Frank Bott, Allison Coleman, Diane Rowland
R2,474 Discovery Miles 24 740 Ships in 10 - 15 working days


Nowadays software engineers not only have to worry about the technical knowledge needed to do their job, but they are increasingly having to know about the legal, professional and commercial context in which they must work. With the explosion of the Internet and major changes to the field with the introduction of the new Data Protection Act and the legal status of software engineers, it is now essential that they have an appreciation of a wide variety of issues outside the technical.
Equally valuable to both students and practitioners, it brings together the expertise and experience of leading academics in software engineering, law, industrial relations, and health and safety, explaining the central principles and issues in each field and shows how they apply to software engineering.
Key Features:
* new and updated edition of a highly successful textbook for students and professional software engineers
* most other books on the subject look at specific languages in software engineering - this looks at specific issues in the context of software engineering
* covers the major changes that have occurred in recent years in the field
Professional Issues in Software Engineering covers all the key issues that students and professionals should have to think about. These include:
* commercial and financial frameworks
* the effect of new technology on employment
* the safety and reliability of computer systems
* health and safety in the workplace
* intellectual property rights in software
* computer contracts
* computer misuse

Threat Modeling - Designing for Security (Paperback): A Shostack Threat Modeling - Designing for Security (Paperback)
A Shostack
R1,482 Discovery Miles 14 820 Ships in 9 - 17 working days

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.

Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.

  • Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs
  • Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric
  • Provides effective approaches and techniques that have been proven at Microsoft and elsewhere
  • Offers actionable how-to advice not tied to any specific software, operating system, or programming language
  • Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world

As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

802.1X Port-Based Authentication (Paperback): Edwin Lyle Brown 802.1X Port-Based Authentication (Paperback)
Edwin Lyle Brown
R1,865 Discovery Miles 18 650 Ships in 10 - 15 working days

Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today's computer networks using this particular network protocol.

The Hacked World Order - How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (Paperback): Adam Segal The Hacked World Order - How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age (Paperback)
Adam Segal
R540 Discovery Miles 5 400 Ships in 10 - 15 working days

For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create "world order." Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield. Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.

Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e (Paperback, 2nd edition): Yuri Diogenes, Orin Thomas Exam Ref AZ-500 Microsoft Azure Security Technologies, 2/e (Paperback, 2nd edition)
Yuri Diogenes, Orin Thomas
R783 Discovery Miles 7 830 Ships in 10 - 15 working days

Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Implement platform protection Manage security operations Secure data and applications This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have expertise implementing security controls and threat protection, managing identity and access, and protecting assets in cloud and hybrid environments About the Exam Exam AZ-500 focuses on the knowledge needed to manage Azure Active Directory identities; configure secure access with Azure AD; manage application access and access control; implement advanced network security; configure advanced security for compute; monitor security with Azure Monitor, Azure Firewall manager, Azure Security Center, Azure Defender, and Azure Sentinel; configure security policies; configure security for storage and databases; and configure and manage Key Vault. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of maintaining security posture, identifying and remediating vulnerabilities, implementing threat protection, and responding to incident escalations as part of a cloud-based management and security team. See full details at: microsoft.com/learn

The Right to Data Protection - Individual and Structural Dimensions of Data Protection in EU Law (Hardcover, 1st ed. 2022):... The Right to Data Protection - Individual and Structural Dimensions of Data Protection in EU Law (Hardcover, 1st ed. 2022)
Felix Bieker
R1,288 Discovery Miles 12 880 Ships in 10 - 15 working days

This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data protection under the EU Charter and its relationship to the secondary legislation. Furthermore, the case law of the Court of Justice of the EU as well as current academic conceptualizations are analysed. The author finds that current approaches invariably link data protection to privacy and often fail to address the structural implications of data processing. He therefore suggests a dualistic approach to data protection: in its individual dimension, data protection aims to protect natural persons and their rights, while the structural dimension protects the democratic society as a whole from the adverse effects of data processing. Using this approach, the full potential of an independent right to data protection can be realized. Researchers, practitioners and students will find this a valuable resource on the rationales, scope and application of data protection. Felix Bieker is Legal Researcher at the Office of the Data Protection Commissioner of Schleswig-Holstein (Unabhangiges Landeszentrum fur Datenschutz) in Kiel, Germany.

Security+ Guide to Network Security Fundamentals, International Edition (Paperback, International Edition): Mark Ciampa Security+ Guide to Network Security Fundamentals, International Edition (Paperback, International Edition)
Mark Ciampa
R1,378 R1,278 Discovery Miles 12 780 Save R100 (7%) Ships in 10 - 15 working days

Reflecting the latest trends and developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, International Edition, provides a complete introduction to practical network and computer security and maps to the CompTIA Security+ SY0-301 Certification Exam. The text covers the fundamentals of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and, cryptography. This updated edition includes new topics, such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. This new edition features activities that link to the Information Security Community Site, which offers video lectures, podcats, discussion boards, additional hands-on activities and more to provide a wealth of resources and up-to-the minute information.

Cybercrime and Cyber Warfare (Hardcover, New): I Bernik Cybercrime and Cyber Warfare (Hardcover, New)
I Bernik
R3,726 Discovery Miles 37 260 Ships in 18 - 22 working days

In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime. Other sections of this chapter deal with the protection against attacks, fear, investigation and the cost of cybercrime. Relevant legislation and legal bodies, which are used in cybercrime, are briefly described at the end of the chapter. The second chapter deals with cyberwarfare and explains the difference between classic cybercrime and operations taking place in the modern inter-connected world. It tackles the following questions: who is committing cyberwarfare; who are the victims and who are the perpetrators? Countries which have an important role in cyberwarfare around the world, and the significant efforts being made to combat cyberwarfare on national and international levels, are mentioned. The common points of cybercrime and cyberwarfare, the methods used to protect against them and the vision of the future of cybercrime and cyberwarfare are briefly described at the end of the book. Contents 1. Cybercrime. 2. Cyberwarfare. About the Authors Igor Bernik is Vice Dean for Academic Affairs and Head of the Information Security Lab at the University of Maribor, Slovenia. He has written and contributed towards over 150 scientific articles and conference papers, and co-authored 4 books. His current research interests concern information/cybersecurity, cybercrime, cyberwarfare and cyberterrorism.

IBM Mainframe Security - Beyond the Basics -- A Practical Guide from a z/OS & RACF Perspective (Paperback): Dinesh D. Dattani IBM Mainframe Security - Beyond the Basics -- A Practical Guide from a z/OS & RACF Perspective (Paperback)
Dinesh D. Dattani
R1,272 R1,111 Discovery Miles 11 110 Save R161 (13%) Ships in 18 - 22 working days

Rather than rehashing basic information -- such as command syntax -- already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most large IT organisations; security cannot be left to chance. With very little training available to the younger crowd, and older, more experienced personnel retiring or close to retiring, there is a need in mainframe security skills at the senior level. Based on real-life experiences, issues, and solutions to mainframe security from the author's three decades of practical experience as a mainframe security practitioner, this book fulfils that need.

Security and Fault Tolerance in Internet of Things (Hardcover, 1st ed. 2019): Rajat Subhra Chakraborty, Jimson Mathew,... Security and Fault Tolerance in Internet of Things (Hardcover, 1st ed. 2019)
Rajat Subhra Chakraborty, Jimson Mathew, Athanasios V Vasilakos
R3,116 Discovery Miles 31 160 Ships in 18 - 22 working days

This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.

Network Attacks and Defenses - A Hands-on Approach (Paperback): Zouheir Trabelsi, Kadhim Hayawi, Arwa  Al Braiki, Sujith Samuel... Network Attacks and Defenses - A Hands-on Approach (Paperback)
Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
R1,866 Discovery Miles 18 660 Ships in 10 - 15 working days

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laboratory environment. Topics covered in the labs include: Content Addressable Memory (CAM) table poisoning attacks on network switches Address Resolution Protocol (ARP) cache poisoning attacks The detection and prevention of abnormal ARP traffic Network traffic sniffing and the detection of Network Interface Cards (NICs) running in promiscuous mode Internet Protocol-Based Denial-of-Service (IP-based DoS) attacks Reconnaissance traffic Network traffic filtering and inspection Common mechanisms used for router security and device hardening Internet Protocol Security Virtual Private Network (IPsec VPN) security solution protocols, standards, types, and deployments Remote Access IPsec VPN security solution architecture and its design, components, architecture, and implementations These practical exercises go beyond theory to allow students to better anatomize and elaborate offensive and defensive techniques. Educators can use the model scenarios described in this book to design and implement innovative hands-on security exercises. Students who master the techniques in this book will be well armed to counter a broad range of network security threats.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover): Thomas R.... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Hardcover)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R5,215 Discovery Miles 52 150 Ships in 10 - 15 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam. The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Practical Data Security - Applied Information Technology (Hardcover): John Gordon Practical Data Security - Applied Information Technology (Hardcover)
John Gordon
R3,080 Discovery Miles 30 800 Ships in 10 - 15 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
365-Day Diabetic Smoothie Cookbook - 365…
Veronica Stockton Hardcover R809 Discovery Miles 8 090
Home Food With Zero Guilt - 55…
Trish van der Nest Paperback R350 R328 Discovery Miles 3 280
The Simple Pit Boss Wood Pellet Grill…
Kathleen Butler Hardcover R906 Discovery Miles 9 060
Keto Diet Pizza & Pasta Cookbook…
Janie Williams Hardcover R1,037 Discovery Miles 10 370
The Comprehensive Ninja Foodi XL Pro Air…
Damian Strickland Hardcover R762 Discovery Miles 7 620
The South African Guide To Gluten-Free…
Zorah Booley Samaai Paperback R400 R357 Discovery Miles 3 570
The Vegan 8 - 100 Simple, Delicious…
Brandy Doming Paperback R660 R609 Discovery Miles 6 090
Uten Air Fryer Cookbook For Beginners…
Ryan Martinez Hardcover R764 Discovery Miles 7 640
Deliciously Ella: How To Go Plant-Based…
Ella Mills Hardcover R677 Discovery Miles 6 770
Pressure Canning Cookbook 1200 - 1200…
Jerry Holm Hardcover R790 Discovery Miles 7 900

 

Partners