0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (254)
  • R250 - R500 (576)
  • R500+ (5,286)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July... Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada (Hardcover, 2007 ed.)
Sandro Etalle, Stephen Marsh
R2,998 Discovery Miles 29 980 Ships in 10 - 15 working days

This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Moncton, New Brunswick, Canada from July 29 to August 2, 2007.

The annual iTrust international conference looks at trust from multidisciplinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology. The annual PST conference has quickly established itself as a leader in multidisciplinary research on a wide range of topics related to Privacy, Security and Trust, looked at from research and practice, through academe, business, and government. The two conferences have come together this year to take a more thorough look at all elements of trust management.

The highlights of IFIPTM 2007 included invited talks by industrial and academic experts including Larry Korba from NRC-IIT, Brian O'Higgins of 3rd Brigade, Jim Robbins from EWA, Jonathan Cave from RAND, Roger London, and Bruce Cowper from Microsoft Canada.

Enterprise Identity Management - Towards an Investment Decision Support Approach (Hardcover, 2013 ed.): Denis Royer Enterprise Identity Management - Towards an Investment Decision Support Approach (Hardcover, 2013 ed.)
Denis Royer
R3,456 Discovery Miles 34 560 Ships in 12 - 17 working days

The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented.

Anomaly Detection Principles and Algorithms (Hardcover, 1st ed. 2017): Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang Anomaly Detection Principles and Algorithms (Hardcover, 1st ed. 2017)
Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang
R2,724 R1,957 Discovery Miles 19 570 Save R767 (28%) Ships in 12 - 17 working days

This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.

Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function... Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function Evaluation (Paperback, 2012 ed.)
Thomas Schneider
R3,431 Discovery Miles 34 310 Ships in 10 - 15 working days

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.

AI-based Metaheuristics for Information Security in Digital Media (Hardcover): Apoorva S Shastri, Mangal Singh, Anand J.... AI-based Metaheuristics for Information Security in Digital Media (Hardcover)
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
R2,535 Discovery Miles 25 350 Ships in 9 - 15 working days

AI Metaheuristics for Information Security in Digital Media examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications. Drawing on multidisciplinary research including computer vision, machine learning, artificial intelligence, modified/newly developed metaheuristics algorithms, it will enhance information security for society. It includes state-of-the-art research with illustrations and exercises throughout.

Combatting Cybercrime and Cyberterrorism - Challenges, Trends and Priorities (Hardcover, 1st ed. 2016): Babak Akhgar, Ben... Combatting Cybercrime and Cyberterrorism - Challenges, Trends and Priorities (Hardcover, 1st ed. 2016)
Babak Akhgar, Ben Brewster
R4,236 Discovery Miles 42 360 Ships in 12 - 17 working days

This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues. Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT. This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.

Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover): Amy Wenxuan Ding Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover)
Amy Wenxuan Ding
R4,577 Discovery Miles 45 770 Ships in 12 - 17 working days

The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.

Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017): Chungwei Lin, Alberto... Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017)
Chungwei Lin, Alberto Sangiovanni-Vincentelli
R3,431 Discovery Miles 34 310 Ships in 10 - 15 working days

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.

Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.): Christoph Boehm, Maximilian Hofer Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.)
Christoph Boehm, Maximilian Hofer
R4,368 R3,510 Discovery Miles 35 100 Save R858 (20%) Ships in 12 - 17 working days

In "Physical Unclonable Functions in Theory and Practice," the authorspresent an in-depth overview ofvarious topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits.

Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit s perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement resultsDifferent error rate reducing pre-selection techniques

This monographgives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic."

Surviving Cyberwar (Hardcover): Richard Stiennon Surviving Cyberwar (Hardcover)
Richard Stiennon
R2,300 Discovery Miles 23 000 Ships in 12 - 17 working days

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: *begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; *follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; *moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; *provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and *finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.

Building Decentralized Trust - Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers (Hardcover,... Building Decentralized Trust - Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers (Hardcover, 1st ed. 2021)
Victoria L. Lemieux, Chen Feng
R3,684 Discovery Miles 36 840 Ships in 10 - 15 working days

This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different "layers" in designing the use of blockchain/Distributed Ledger Technology (DLT) for social trust, trust in data and records, and trust in systems. Blockchain technology has emerged as a solution to the problem of trust in data and records, as well as trust in social, political and economic institutions, due to its profound potential as a digital trust infrastructure. Blockchain is a DLT in which confirmed and validated sets of transactions are stored in blocks that are chained together to make tampering more difficult and render records immutable. This book is dedicated to exploring and disseminating the latest findings on the relationships between socio-political and economic data, record-keeping, and technical aspects of blockchain.

Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018): Tongtong Li, Tianlong Song,... Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018)
Tongtong Li, Tianlong Song, Yuan Liang
R2,943 Discovery Miles 29 430 Ships in 10 - 15 working days

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,485 Discovery Miles 104 850 Ships in 10 - 15 working days
Cybertax - Managing the Risks and Results (Paperback): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Paperback)
George K. Tsantes, James Ransome
R525 Discovery Miles 5 250 Ships in 9 - 15 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017): Suresh Chandra... Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017)
Suresh Chandra Satapathy, Vikrant Bhateja, K Srujan Raju, B. Janakiramaiah
R8,553 Discovery Miles 85 530 Ships in 12 - 17 working days

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) (Paperback, 4th edition): Glen Clarke CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) (Paperback, 4th edition)
Glen Clarke
R913 Discovery Miles 9 130 Ships in 12 - 17 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ exam This highly effective test preparation guide covers every objective for the latest version of the CompTIA Security+ exam (exam SY0-601). Written by CompTIA training expert Glen E. Clarke, this new edition has been thoroughly revised to align with the 2020 update to the exam. "Exam Watch" and "On-the-Job" special elements reinforce salient points throughout. With hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) covers what you need to know and shows you how to prepare for the challenging exam. The book features chapter-ending self-tests along with in-depth explanations for the correct and incorrect answers. All questions closely match those on the live test in content, format, tone, and feel. Online content includes more than 400 practice questions, a lab exercises PDF, video training from the author, and performance-based question simulations Includes a 10% off exam voucher coupon, a $35 value Written by a CompTIA certification expert and experienced author

Operating System Forensics (Paperback): Ric Messier Operating System Forensics (Paperback)
Ric Messier
R1,640 R1,530 Discovery Miles 15 300 Save R110 (7%) Ships in 12 - 17 working days

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Blockchain and Cryptocurrencies (Hardcover): Asma Salman, Muthanna G. Abdul Razzaq Blockchain and Cryptocurrencies (Hardcover)
Asma Salman, Muthanna G. Abdul Razzaq
R3,377 Discovery Miles 33 770 Ships in 10 - 15 working days
Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover): Kenneth J. Knapp Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover)
Kenneth J. Knapp
R5,405 Discovery Miles 54 050 Ships in 12 - 17 working days

Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Hardcover, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,941 Discovery Miles 29 410 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Spyware and Adware (Hardcover, 2011 ed.): John Aycock Spyware and Adware (Hardcover, 2011 ed.)
John Aycock
R3,015 Discovery Miles 30 150 Ships in 10 - 15 working days

"Spyware and Adware" introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

"Spyware and Adware" is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

Confident Cyber Security - The Essential Insights and How to Protect from Threats (Hardcover, 2nd Revised edition): Jessica... Confident Cyber Security - The Essential Insights and How to Protect from Threats (Hardcover, 2nd Revised edition)
Jessica Barker
R1,613 R1,292 Discovery Miles 12 920 Save R321 (20%) Ships in 10 - 15 working days

The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident Cyber Security is here to help. From the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies including Disney, the NHS, Taylor Swift and Frank Abagnale, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. This new edition covers increasingly important topics such as deepfakes, AI and blockchain technology. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.

Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover)
Alex Wagner
R1,012 R848 Discovery Miles 8 480 Save R164 (16%) Ships in 10 - 15 working days
Business Data Networks and Security, Global Edition (Paperback, 10th edition): Raymond Panko, Julia Panko Business Data Networks and Security, Global Edition (Paperback, 10th edition)
Raymond Panko, Julia Panko
R2,599 Discovery Miles 25 990 Ships in 12 - 17 working days

For undergraduate and graduate courses in Business Data Communication / Networking (MIS) Clear writing style, job-ready detail, and focus on the technologies used in today's marketplace Business Data Networks and Security guides readers through the details of networking, while helping them train for the workplace. It starts with the basics of security and network design and management; goes beyond the basic topology and switch operation covering topics like VLANs, link aggregation, switch purchasing considerations, and more; and covers the latest in networking techniques, wireless networking, with an emphasis on security. With this text as a guide, readers learn the basic, introductory topics as a firm foundation; get sound training for the marketplace; see the latest advances in wireless networking; and learn the importance and ins and outs of security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,689 Discovery Miles 86 890
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R7,113 R6,566 Discovery Miles 65 660
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,847 Discovery Miles 68 470
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia Paperback R2,361 Discovery Miles 23 610
PCI Dss: A Pocket Guide
IT Governance Paperback R375 Discovery Miles 3 750
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, … Hardcover R5,016 Discovery Miles 50 160

 

Partners