0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,096)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (Hardcover): Maria Manuela Cruz Cunha,... Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (Hardcover)
Maria Manuela Cruz Cunha, Irene Maria Portela
R9,614 Discovery Miles 96 140 Ships in 18 - 22 working days

In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.

Outlier Analysis (Hardcover, 2013 ed.): Charu C. Aggarwal Outlier Analysis (Hardcover, 2013 ed.)
Charu C. Aggarwal
R4,224 Discovery Miles 42 240 Ships in 10 - 15 working days

With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions- the data can be of any type, structured or unstructured, and may be extremely large. Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists. The book has been organized carefully, and emphasis was placed on simplifying the content, so that students and practitioners can also benefit. Chapters will typically cover one of three areas: methods and techniques commonly used in outlier analysis, such as linear methods, proximity-based methods, subspace methods, and supervised methods; data domains, such as, text, categorical, mixed-attribute, time-series, streaming, discrete sequence, spatial and network data; and key applications of these methods as applied to diverse domains such as credit card fraud detection, intrusion detection, medical diagnosis, earth science, web log analytics, and social network analysis are covered.

CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition): Wm.... CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition)
Wm. Arthur Conklin, Daniel Shoemaker
R1,109 Discovery Miles 11 090 Ships in 10 - 15 working days

Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the exam CSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certification Consortium (ISC) (R). Thoroughly revised and updated for the latest exam release, this guide includes real-world examples and comprehensive coverage on all aspects of application security within the entire software development lifecycle. It also includes hands-on exercises, chapter review summaries and notes, tips, and cautions that provide real-world insight and call out potentially harmful situations. With access to 350 exam questions online, you can practice either with full-length, timed mock exams or by creating your own custom quizzes by chapter or exam objective. CSSLP Certification All-in-One Exam Guide, Third Edition provides thorough coverage of all eight exam domains: Secure Software Concepts Secure Software Requirements Secure Software Design Secure Software Implementation Programming Secure Software Testing Secure Lifecycle Management Software Deployment, Operations, and Maintenance Supply Chain and Software Acquisition

Real-time Security Extensions for EPCglobal Networks - Case Study for the Pharmaceutical Industry (Hardcover, 2014 ed.):... Real-time Security Extensions for EPCglobal Networks - Case Study for the Pharmaceutical Industry (Hardcover, 2014 ed.)
Matthieu-P. Schapranow
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.

Implementing Database Security and Auditing (Paperback): Ron Ben-Natan Implementing Database Security and Auditing (Paperback)
Ron Ben-Natan
R2,325 Discovery Miles 23 250 Ships in 18 - 22 working days

This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to an "internals" level. There are many sections which outline the "anatomy of an attack" - before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape - both from a business and regulatory requirements perspective as well as from a technical implementation perspective.
* Useful to the database administrator and/or security administrator - regardless of the precise database vendor (or vendors) that you are using within your organization.
* Has a large number of examples - examples that pertain to Oracle, SQL Server, DB2, Sybase and even MySQL..
* Many of the techniques you will see in this book will never be described in a manual or a book that is devoted to a certain database product.
* Addressing complex issues must take into account more than just the database and focusing on capabilities that are provided only by the database vendor is not always enough. This book offers a broader view of the database environment - which is not dependent on the database platform - a view that is important to ensure gooddatabase security.

Cyber Security Awareness for Accountants and CPAs (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Accountants and CPAs (Paperback)
David Willson, Henry Dalziel
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Optimizing Information Security and Advancing Privacy Assurance - New Technologies (Hardcover, New): Hamid R. Nemati Optimizing Information Security and Advancing Privacy Assurance - New Technologies (Hardcover, New)
Hamid R. Nemati
R4,935 Discovery Miles 49 350 Ships in 18 - 22 working days

Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary aim being the continuation and promotion of methods and theories in this far-reaching discipline.

IP Cores Design from Specifications to Production - Modeling, Verification, Optimization, and Protection (Hardcover, 1st ed.... IP Cores Design from Specifications to Production - Modeling, Verification, Optimization, and Protection (Hardcover, 1st ed. 2016)
Khaled Salah Mohamed
R2,705 R1,804 Discovery Miles 18 040 Save R901 (33%) Ships in 10 - 15 working days

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including those associated with many of the most common memory cores, controller IPs and system-on-chip (SoC) buses. Readers will also benefit from the author's practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain. A SoC case study is presented to compare traditional verification with the new verification methodologies. Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; Introduce a deep introduction for Verilog for both implementation and verification point of view. Demonstrates how to use IP in applications such as memory controllers and SoC buses. Describes a new verification methodology called bug localization; Presents a novel scan-chain methodology for RTL debugging; Enables readers to employ UVM methodology in straightforward, practical terms.

Cyber-Risk Informatics - Engineering Evaluation with Data Science (Hardcover): M. Sahinoglu Cyber-Risk Informatics - Engineering Evaluation with Data Science (Hardcover)
M. Sahinoglu
R3,851 Discovery Miles 38 510 Ships in 10 - 15 working days

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book s specifically preserved website will enable readers to utilize the course related problems. Enables the reader to use the book's website's applications to implement and see results, and use them making budgetary sense Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University s metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

Cyber Security - Everything an Executive Needs to Know (Hardcover): Phillip Ferraro Cyber Security - Everything an Executive Needs to Know (Hardcover)
Phillip Ferraro
R627 R566 Discovery Miles 5 660 Save R61 (10%) Ships in 18 - 22 working days
Security Engineering for Cloud Computing - Approaches and Tools (Hardcover): David G. Rosado, Daniel Mellado, Eduardo... Security Engineering for Cloud Computing - Approaches and Tools (Hardcover)
David G. Rosado, Daniel Mellado, Eduardo Fernandez-Medina, Mario Piattini
R4,902 Discovery Miles 49 020 Ships in 18 - 22 working days

Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.

Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach (Hardcover, 1st ed.... Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach (Hardcover, 1st ed. 2018)
Simon Parkinson, Andrew Crampton, Richard Hill
R1,576 Discovery Miles 15 760 Ships in 18 - 22 working days

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

Skype Me! From Single User to Small Enterprise and Beyond (Paperback): Markus Daehne Skype Me! From Single User to Small Enterprise and Beyond (Paperback)
Markus Daehne
R1,106 Discovery Miles 11 060 Ships in 10 - 15 working days

This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new "Skype Ready" cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.
* Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members
* Skype's Application Programming Interface (API) allows users to develop their own applications and customize Skype with the information found in this book
* Makrus Daehne is one of the most recognized and respected authorities on Skype and he is the forum moderator on the Skype Web site

Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July... Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada (Hardcover, 2007 ed.)
Sandro Etalle, Stephen Marsh
R2,717 Discovery Miles 27 170 Ships in 18 - 22 working days

This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada from July 29 to August 2, 2007.

The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. The annual PST conference has quickly established itself as a leader in multidisciplinary research on a wide range of topics related to Privacy, Security and Trust, looked at from research and practice, through academe, business, and government. The two conferences have come together this year to take a more thorough look at all elements of trust management.

The highlights of IFIPTM 2007 included invited talks by industrial and academic experts including Larry Korba from NRC-IIT, Brian O'Higgins of 3rd Brigade, Jim Robbins from EWA, Jonathan Cave from RAND, Roger London, and Bruce Cowper from Microsoft Canada.

Cybersecurity Exposed - The Cyber House Rules (Hardcover): Raef Meeuwisse Cybersecurity Exposed - The Cyber House Rules (Hardcover)
Raef Meeuwisse
R656 Discovery Miles 6 560 Ships in 18 - 22 working days
Your Amazing Itty Bitty Personal Data Protection Book - 15 Keys to Minimize Your Exposure to Cybercrime Using These Essential... Your Amazing Itty Bitty Personal Data Protection Book - 15 Keys to Minimize Your Exposure to Cybercrime Using These Essential Steps (Paperback)
Karen Worstell
R216 Discovery Miles 2 160 Ships in 18 - 22 working days
Secondary Liability of Internet Service Providers (Hardcover, 2017 ed.): Graeme B. Dinwoodie Secondary Liability of Internet Service Providers (Hardcover, 2017 ed.)
Graeme B. Dinwoodie
R5,122 Discovery Miles 51 220 Ships in 10 - 15 working days

This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers. Many such claims involve intellectual property infringement, but the treatment extends beyond that field of law. Because there are few formal international standards which govern the question of secondary liability, comprehension of the international landscape requires treatment of a broad range of national approaches. This book thus canvasses numerous jurisdictions across several continents, but presents these comparative studies thematically to highlight evolving commonalities and trans-border commercial practices that exist despite the lack of hard international law. The analysis presented in this book allows exploration not only of contemporary debates about the appropriate policy levers through which to regulate intermediaries, but also about the conceptual character of secondary liability rules.

Sustainable Interdependent Networks II - From Smart Power Grids to Intelligent Transportation Networks (Hardcover, 1st ed.... Sustainable Interdependent Networks II - From Smart Power Grids to Intelligent Transportation Networks (Hardcover, 1st ed. 2019)
M. Hadi Amini, Kianoosh G. Boroojeni, S.S. Iyengar, Panos M. Pardalos, Frede Blaabjerg, …
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This book paves the way for researchers working on the sustainable interdependent networks spread over the fields of computer science, electrical engineering, and smart infrastructures. It provides the readers with a comprehensive insight to understand an in-depth big picture of smart cities as a thorough example of interdependent large-scale networks in both theory and application aspects. The contributors specify the importance and position of the interdependent networks in the context of developing the sustainable smart cities and provide a comprehensive investigation of recently developed optimization methods for large-scale networks. There has been an emerging concern regarding the optimal operation of power and transportation networks. In the second volume of Sustainable Interdependent Networks book, we focus on the interdependencies of these two networks, optimization methods to deal with the computational complexity of them, and their role in future smart cities. We further investigate other networks, such as communication networks, that indirectly affect the operation of power and transportation networks. Our reliance on these networks as global platforms for sustainable development has led to the need for developing novel means to deal with arising issues. The considerable scale of such networks, due to the large number of buses in smart power grids and the increasing number of electric vehicles in transportation networks, brings a large variety of computational complexity and optimization challenges. Although the independent optimization of these networks lead to locally optimum operation points, there is an exigent need to move towards obtaining the globally-optimum operation point of such networks while satisfying the constraints of each network properly. The book is suitable for senior undergraduate students, graduate students interested in research in multidisciplinary areas related to future sustainable networks, and the researchers working in the related areas. It also covers the application of interdependent networks which makes it a perfect source of study for audience out of academia to obtain a general insight of interdependent networks.

Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover): Amy Wenxuan Ding Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover)
Amy Wenxuan Ding
R4,210 Discovery Miles 42 100 Ships in 18 - 22 working days

The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.

Computer-Mediated Communication (Hardcover): Indrakshi Dey Computer-Mediated Communication (Hardcover)
Indrakshi Dey
R3,069 Discovery Miles 30 690 Ships in 18 - 22 working days
Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017): Chungwei Lin, Alberto... Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017)
Chungwei Lin, Alberto Sangiovanni-Vincentelli
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.

Cyber Security in Business and Management (Hardcover): Stephen Mason Cyber Security in Business and Management (Hardcover)
Stephen Mason
R3,055 R2,770 Discovery Miles 27 700 Save R285 (9%) Ships in 18 - 22 working days
Cyber Security Awareness for Lawyers (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Lawyers (Paperback)
David Willson, Henry Dalziel
R1,104 Discovery Miles 11 040 Ships in 10 - 15 working days

Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Eleventh Hour Security+ - Exam SY0-201 Study Guide (Paperback): Ido Dubrawsky Eleventh Hour Security+ - Exam SY0-201 Study Guide (Paperback)
Ido Dubrawsky
R733 Discovery Miles 7 330 Ships in 10 - 15 working days

This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours. The book will include: Exam Objectives Fast Track Review Key words/definitions Five Toughest questions and their answers Exam Warnings What to pay attention to

The only book keyed to the new SY0-201 objectives that has been crafted for last minute cramming
Easy to find, essential material with no fluff this book does not talk about security in general, just how it applies to the test
Includes review of five toughest questions by topic - sure to improve your score

Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.): Christoph Boehm, Maximilian Hofer Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.)
Christoph Boehm, Maximilian Hofer
R4,190 R3,389 Discovery Miles 33 890 Save R801 (19%) Ships in 10 - 15 working days

In "Physical Unclonable Functions in Theory and Practice," the authorspresent an in-depth overview ofvarious topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits.

Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit s perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement resultsDifferent error rate reducing pre-selection techniques

This monographgives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cross-Industry Applications of Cyber…
Sukanta Kumar Baral, Richa Goel, … Hardcover R6,170 Discovery Miles 61 700
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R7,977 Discovery Miles 79 770
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R5,931 Discovery Miles 59 310
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310

 

Partners