0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (272)
  • R250 - R500 (607)
  • R500+ (5,288)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Ethical Hacking for Beginners - How to Build Your Pen Test Lab Fast (Hardcover): Attila Kovacs Ethical Hacking for Beginners - How to Build Your Pen Test Lab Fast (Hardcover)
Attila Kovacs
R844 R699 Discovery Miles 6 990 Save R145 (17%) Ships in 10 - 15 working days
Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,142 Discovery Miles 11 420 Ships in 10 - 15 working days
DNSSEC Mastery, 2nd Edition (Hardcover): Michael W Lucas DNSSEC Mastery, 2nd Edition (Hardcover)
Michael W Lucas
R947 R816 Discovery Miles 8 160 Save R131 (14%) Ships in 10 - 15 working days
Computer Networking and Cybersecurity (Paperback): Quinn Kiser Computer Networking and Cybersecurity (Paperback)
Quinn Kiser
R862 R717 Discovery Miles 7 170 Save R145 (17%) Ships in 10 - 15 working days
A Hacker, I Am (Hardcover): Craig Ford A Hacker, I Am (Hardcover)
Craig Ford
R969 R795 Discovery Miles 7 950 Save R174 (18%) Ships in 10 - 15 working days
Real-Time and Retrospective Analyses of Cyber Security (Hardcover): David Anthony Bird Real-Time and Retrospective Analyses of Cyber Security (Hardcover)
David Anthony Bird
R5,612 Discovery Miles 56 120 Ships in 12 - 17 working days

Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.

Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous... Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings (Hardcover)
Daphne Tuncer, Robert Koch, Remi Badonnel
R1,403 Discovery Miles 14 030 Ships in 10 - 15 working days
Cryptography - Recent Advances and Future Developments (Hardcover): Riccardo Bernardini Cryptography - Recent Advances and Future Developments (Hardcover)
Riccardo Bernardini
R3,456 R3,228 Discovery Miles 32 280 Save R228 (7%) Ships in 10 - 15 working days
Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security... Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls (Paperback)
Tom Piens
R1,229 Discovery Miles 12 290 Ships in 10 - 15 working days

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

Cybersecurity - A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the... Cybersecurity - A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering (Hardcover)
Quinn Kiser
R724 R603 Discovery Miles 6 030 Save R121 (17%) Ships in 10 - 15 working days
8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback): K Crawley 8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback)
K Crawley
R502 Discovery Miles 5 020 Ships in 12 - 17 working days

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Strategic Approaches to Digital Platform Security Assurance (Hardcover): Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves... Strategic Approaches to Digital Platform Security Assurance (Hardcover)
Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, Dennis Verslegers
R5,616 Discovery Miles 56 160 Ships in 12 - 17 working days

Nowadays it is impossible to imagine a business without technology as most industries are becoming ""smarter"" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and ""platform""-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.

Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback): Jeffrey... Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback)
Jeffrey A. Lee
R541 Discovery Miles 5 410 Ships in 12 - 17 working days

In Online Predators, An Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings his ten plus years' experience in the fight against online child exploitation to bear in an easy to follow guide for all with a stake in the life of a child. This book equips parents, guardians, extended family, and educational professionals with practical strategies to help keep kids safe in a technology connected world. Instead of focusing on ever changing technology, Lee proposes a key fundamental change in the fight against online predation-to develop an insatiable curiosity about their child's online life, then get in the front lines and stay there.

Security in Computer and Information Sciences (Hardcover): Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios Security in Computer and Information Sciences (Hardcover)
Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios
R1,346 Discovery Miles 13 460 Ships in 10 - 15 working days
Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover): Amit Kumar Tyagi Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover)
Amit Kumar Tyagi
R8,468 Discovery Miles 84 680 Ships in 12 - 17 working days

More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. It further explores select methods and algorithms of learning for implementing better security methods in fields such as business and healthcare. It recognizes the future of privacy and the importance of preserving data through recommended practice, feedback loops, and smart agents. Covering topics such as face mask detection, gesture recognition, and botnet attacks and detection, this major reference work is a dynamic resource for medical professionals, healthcare administrators, government officials, business executives and managers, IT managers, students and faculty of higher education, librarians, researchers, and academicians.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover)
Information Reso Management Association
R9,468 Discovery Miles 94 680 Ships in 10 - 15 working days
Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover)
Adam Dodson
R593 R491 Discovery Miles 4 910 Save R102 (17%) Ships in 10 - 15 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover)
Information R Management Association
R12,566 Discovery Miles 125 660 Ships in 12 - 17 working days
Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover)
Information Reso Management Association
R9,468 Discovery Miles 94 680 Ships in 10 - 15 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover)
Information R Management Association
R12,565 Discovery Miles 125 650 Ships in 12 - 17 working days
Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,466 Discovery Miles 94 660 Ships in 10 - 15 working days
Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems (Hardcover): Michael A. Yastrebenetsky,... Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems (Hardcover)
Michael A. Yastrebenetsky, Vyacheslav S. Kharchenko
R5,635 Discovery Miles 56 350 Ships in 12 - 17 working days

Safety and security are crucial to the operations of nuclear power plants, but cyber threats to these facilities are increasing significantly. Instrumentation and control systems, which play a vital role in the prevention of these incidents, have seen major design modifications with the implementation of digital technologies. Advanced computing systems are assisting in the protection and safety of nuclear power plants; however, significant research on these computational methods is deficient. Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems is a pivotal reference source that provides vital research on the digital developments of instrumentation and control systems for assuring the safety and security of nuclear power plants. While highlighting topics such as accident monitoring systems, classification measures, and UAV fleets, this publication explores individual cases of security breaches as well as future methods of practice. This book is ideally designed for engineers, industry specialists, researchers, policymakers, scientists, academicians, practitioners, and students involved in the development and operation of instrumentation and control systems for nuclear power plants, chemical and petrochemical industries, transport, and medical equipment.

Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R564 R479 Discovery Miles 4 790 Save R85 (15%) Ships in 10 - 15 working days
Cross-Industry Applications of Cyber Security Frameworks (Hardcover): Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman,... Cross-Industry Applications of Cyber Security Frameworks (Hardcover)
Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
R6,512 Discovery Miles 65 120 Ships in 12 - 17 working days

Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Cross-Industry Applications of Cyber Security Frameworks provides an understanding of the specific, standards-based security controls that make up a best practice cybersecurity program. It is equipped with cross-industry applications of cybersecurity frameworks, best practices for common practices, and suggestions that may be highly relevant or appropriate in every case. Covering topics such as legal frameworks, cybersecurity in FinTech, and open banking, this premier reference source is an essential resource for executives, business leaders, managers, entrepreneurs, IT professionals, government officials, hospital administrators, educational administrators, privacy specialists, researchers, and academicians.

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover)
Information R Management Association
R12,560 Discovery Miles 125 600 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Crisis Management and…
Ryma Abassi, Aida Ben Chehida Douss Hardcover R6,256 Discovery Miles 62 560
CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,221 Discovery Miles 12 210
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,613 Discovery Miles 56 130
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,949 R6,257 Discovery Miles 62 570
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R8,415 Discovery Miles 84 150
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
Ethical Hacking - The Ultimate Guide to…
Lester Evans Hardcover R721 R600 Discovery Miles 6 000
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960

 

Partners