0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (594)
  • R500+ (5,139)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Anonymous Security Systems and Applications - Requirements and Solutions (Hardcover, New): Shinsuke Tamura Anonymous Security Systems and Applications - Requirements and Solutions (Hardcover, New)
Shinsuke Tamura
R4,905 Discovery Miles 49 050 Ships in 18 - 22 working days

As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R503 Discovery Miles 5 030 Ships in 18 - 22 working days
Network Science and Cybersecurity (Hardcover, 2014 ed.): Robinson E. Pino Network Science and Cybersecurity (Hardcover, 2014 ed.)
Robinson E. Pino
R4,203 R1,946 Discovery Miles 19 460 Save R2,257 (54%) Ships in 10 - 15 working days

"Network Science and Cybersecurity" introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.

This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .

Managing Online Risk - Apps, Mobile, and Social Media Security (Paperback): Deborah Gonzalez Managing Online Risk - Apps, Mobile, and Social Media Security (Paperback)
Deborah Gonzalez
R813 Discovery Miles 8 130 Ships in 10 - 15 working days

In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book.

Hacking and Penetration Testing with Low Power Devices (Paperback): Philip Polstra Hacking and Penetration Testing with Low Power Devices (Paperback)
Philip Polstra
R1,141 Discovery Miles 11 410 Ships in 10 - 15 working days

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to use various configurations, including a device the size of a deck of cards that can easily be attached to the back of a computer. While each device running The Deck is a full-featured pen-testing platform, connecting systems together via 802.15.3 networking gives you even more power and flexibility. This reference teaches you how to construct and power these devices, install operating systems, and fill out your toolbox of small low-power devices with hundreds of tools and scripts from the book's companion website. Hacking and Pen Testing with Low Power Devices puts all these tools into your hands and will help keep you at the top of your game performing cutting-edge pen tests from anywhere in the world!

Cyber Warfare - A Reference Handbook (Hardcover): Paul J. Springer Cyber Warfare - A Reference Handbook (Hardcover)
Paul J. Springer
R1,944 R1,742 Discovery Miles 17 420 Save R202 (10%) Ships in 10 - 15 working days

This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat-from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This essential reference-the only of its kind to include an overview of other cyber warfare literature-emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers. Incorporates expertise from diverse viewpoints from the military, government agencies, industry, and academia Provides an informative timeline of key events in the development of cyber warfare capabilities Highlights the most prominent and effective cyber attacks in history as well as legal attempts to curb them

Internet and Intranet Security (Hardcover, 2nd Revised edition): Rolf Oppliger Internet and Intranet Security (Hardcover, 2nd Revised edition)
Rolf Oppliger
R2,766 Discovery Miles 27 660 Ships in 18 - 22 working days

This extensively revised, new edition of the 1998 Artech House classic, "Internet and Intranet Security", offers professionals an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall technologies to help practitioners provide access control service, and discusses the cryptographic protocols used to provide today's communication security services. From TCP/IP networking and cryptographic fundamentals, to firewall technologies, communication security protocols, and public key infrastructures, this handy reference offers practical guidance in utilizing cutting-edge technologies to secure various applications in the field of e-commerce and e-business. The book explores the rationale behind the security technologies that have been proposed and deployed on the Internet, and shows how to implement security mechanisms and corresponding protocol specifications.

Smart Systems for E-Health - WBAN Technologies, Security and Applications (Hardcover, 1st ed. 2021): Hanen Idoudi, Thierry Val Smart Systems for E-Health - WBAN Technologies, Security and Applications (Hardcover, 1st ed. 2021)
Hanen Idoudi, Thierry Val
R4,635 Discovery Miles 46 350 Ships in 10 - 15 working days

The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health.

Professional Penetration Testing - Creating and Learning in a Hacking Lab (Paperback, 2nd edition): Thomas Wilhelm Professional Penetration Testing - Creating and Learning in a Hacking Lab (Paperback, 2nd edition)
Thomas Wilhelm
R1,680 Discovery Miles 16 800 Ships in 10 - 15 working days

"Professional Penetration Testing "walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.

Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.

All disc-based content for this title is now available on the Web.

Find out how to turn hacking and pen testing skills into a professional career

Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers

Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business

Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016): Yulong Zou, Jia Zhu Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016)
Yulong Zou, Jia Zhu
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

Security Technology Convergence Insights (Paperback): Ray Bernard Security Technology Convergence Insights (Paperback)
Ray Bernard
R1,843 Discovery Miles 18 430 Ships in 10 - 15 working days

Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management.

IT Issues in Higher Education - Emerging Research and Opportunities (Hardcover): Lazarus Ndiku Makewa, Baraka Manjale Ngussa IT Issues in Higher Education - Emerging Research and Opportunities (Hardcover)
Lazarus Ndiku Makewa, Baraka Manjale Ngussa
R4,585 Discovery Miles 45 850 Ships in 18 - 22 working days

Effective use of technology in areas that include admissions, record keeping, billing, compliance, athletic administration, and more hold untold potential to transform higher education by introducing significant efficiencies and dramatic cost reductions in serving students. How the institution organizes itself will to a large extent depend on how the IT systems are established and maintained. The design, development, management, utilization, and evaluation of these IT systems will be necessary for the university to operate successfully. IT Issues in Higher Education: Emerging Research and Opportunities is a pivotal reference source that provides vital research on the integration and management of information technology in higher education with a focus on issues of security, data management, student access to information, and staff competency. This publication explores present-day educational environments as well as educators' methods of applying technology to student success and highlights topics that include personal devices and institutional culture. It is ideally designed for academic professionals, lecturers, students, professors, IT experts, instructional designers, curriculum developers, administrators, higher education faculty, researchers, and policymakers.

Information Science and Applications 2018 - ICISA 2018 (Hardcover, 1st ed. 2019): Kuinam J. Kim, Nakhoon Baek Information Science and Applications 2018 - ICISA 2018 (Hardcover, 1st ed. 2019)
Kuinam J. Kim, Nakhoon Baek
R7,093 Discovery Miles 70 930 Ships in 18 - 22 working days

This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.

The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback): Stephen D Gantz The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback)
Stephen D Gantz
R852 Discovery Miles 8 520 Ships in 10 - 15 working days

"The Basics of IT Audit: Purposes, Processes, and Practical Information" provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.

IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements.

This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
Provides a concise treatment of IT auditing, allowing you to prepare for, participate in, and respond to the resultsDiscusses the pros and cons of doing internal and external IT audits, including the benefits and potential drawbacks of eachCovers the basics of complex regulations and standards, such as Sarbanes-Oxley, SEC (public companies), HIPAA, and FFIECIncludes most methods and frameworks, including GAAS, COSO, COBIT, ITIL, ISO (27000), and FISCAM

Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016): Ehab Al-Shaer,... Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016)
Ehab Al-Shaer, Mohammad Ashiqur Rahman
R3,236 Discovery Miles 32 360 Ships in 18 - 22 working days

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.

Security and the Networked Society (Hardcover, 2013 ed.): Mark A. Gregory, David Glance Security and the Networked Society (Hardcover, 2013 ed.)
Mark A. Gregory, David Glance
R2,733 R1,967 Discovery Miles 19 670 Save R766 (28%) Ships in 10 - 15 working days

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource.

FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed): Laura P Taylor FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed)
Laura P Taylor
R1,489 Discovery Miles 14 890 Ships in 10 - 15 working days

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.

Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. "

FISMA Compliance Handbook Second Edition, "also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
Includes new information on cloud computing compliance from Laura Taylor, the federal government s technical lead for FedRAMP

Includes coverage for both corporate and government IT managers

Learn how to prepare for, perform, and document FISMA compliance projects

This book is used by various colleges and universities in information security and MBA curriculums. "

Information Protection Playbook (Paperback): Greg Kane, Lorna Koppel Information Protection Playbook (Paperback)
Greg Kane, Lorna Koppel
R1,457 Discovery Miles 14 570 Ships in 10 - 15 working days

The primary" "goal of the" Information Protection Playbook" is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy.

Using the guidelines provided in the "Information Protection Playbook," security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.

The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.

The "Information Protection Playbook" is a part of Elsevier s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standardsDraws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive CouncilIncludes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book"

Ruby Developers Guide (Paperback): Syngress Ruby Developers Guide (Paperback)
Syngress
R1,403 Discovery Miles 14 030 Ships in 10 - 15 working days

An expert guide to Ruby, a popular new Object-Oriented Programming Language
Ruby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.
Using step-by-step examples and real world applications, the Ruby Developer's Guide is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. Readers will learn how to develop, implement, organize and deploy applications using Ruby.
Ruby is currently experiencing a rapid rise in popularity in the object-oriented programming community
Readers receive up-to-the minute links, white papers, and analysis for two years at [email protected]
Comes with a wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular Ruby third-party programming tools and applications

Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New): Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New)
R4,592 Discovery Miles 45 920 Ships in 18 - 22 working days

Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.

Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture,... Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) (Hardcover)
Benjamin Walker
R570 R524 Discovery Miles 5 240 Save R46 (8%) Ships in 18 - 22 working days
How to Cheat at Configuring ISA Server 2004 (Paperback): Debra Littlejohn Shinder, Thomas W. Shinder How to Cheat at Configuring ISA Server 2004 (Paperback)
Debra Littlejohn Shinder, Thomas W. Shinder
R1,015 Discovery Miles 10 150 Ships in 10 - 15 working days

How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.
How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide.
* Administrators daily jobs - too many mission critical tasks in too little time. A quick reference to ISA Server
* Written by Dr. Tom Shinder, the undisputed authority on Installing, Configuring, Managing and Troubleshooting ISA Server
* Includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation

Google Talking (Paperback): Joshua Brashars, Johnny Long Google Talking (Paperback)
Joshua Brashars, Johnny Long
R1,090 Discovery Miles 10 900 Ships in 10 - 15 working days

Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool.
Google Talking takes communication to the next level, combining the awesome power of Text and Voice This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.
This book will cover the program Google Talk in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.
* Google has 41% of the search engine market making it by far the most commonly used search engine
* The Instant Messaging market has 250 million users world wide
* Google Talking will be the first book to hit the streets about Google Talk"

IBM i Security Administration and Compliance (Paperback): Carol Woodbury IBM i Security Administration and Compliance (Paperback)
Carol Woodbury
R1,785 R1,575 Discovery Miles 15 750 Save R210 (12%) Ships in 18 - 22 working days

In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know about IBM i security. The definitive IBM i security reference, this Third Edition expands on the examples in previous editions to provide readers with clear, detailed explanations of current IBM i security features and explains how to implement and audit them. The Third Edition includes a new chapter dedicated to auditors to help them more effectively audit an IBM i (formerly AS/400 and iSeries). It also includes a new chapter containing practical examples of using the Authority Collection feature added in V7R3 and enhanced in V7R4. This new edition provides techniques for using security-related SQL views, guidance for determining what should be sent to your SIEM, methods to determine whether your IBM i has been breached, tips for avoiding malware on your IBM i, and updated examples throughout. Useful for security officers, security and system administrators, compliance officers, and internal and external auditors, the resources available in this book help organizations reduce the risk to the data residing on their IBM i systems and avoid business disruption by helping them protect systems and data from unauthorized access and modification.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - International Symposium on Software... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (Hardcover, 1st ed. 2017)
Yang Xu
R5,477 Discovery Miles 54 770 Ships in 18 - 22 working days

These proceedings present the latest information on software reliability, industrial safety, cyber security, physical protection, testing and verification for nuclear power plants. The papers were selected from more than 80 submissions and presented at the First International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection for Nuclear Power Plants, held in Yinchuan, China on May 30 - June 1, 2016. The primary aim of this symposium was to provide a platform to facilitate the discussion for comprehension, application and management of digital instrumentation, control systems and technologies in nuclear power plants. The book reflects not only the state of the art and latest trends in nuclear instrumentation and control system technologies, but also China's increasing influence in this area. It is a valuable resource for both practitioners and academics working in the field of nuclear instrumentation, control systems and other safety-critical systems, as well as nuclear power plant managers, public officials and regulatory authorities.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advanced Technologies of Quantum Key…
Sergiy Gnatyuk Hardcover R3,089 Discovery Miles 30 890
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Cybersecurity 2021
Carl Freeman Hardcover R1,039 R877 Discovery Miles 8 770
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
The Cybersecurity Mindset - A Virtual…
Dewayne Hart Hardcover R742 Discovery Miles 7 420
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920

 

Partners