0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (7)
  • R250 - R500 (16)
  • R500+ (131)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking packages

Managing IT for Innovation - Dynamic Capabilities and Competitive Advantage (Paperback): Mitsuru Kodama Managing IT for Innovation - Dynamic Capabilities and Competitive Advantage (Paperback)
Mitsuru Kodama
R1,224 Discovery Miles 12 240 Ships in 9 - 15 working days

With recent advances in IT in areas such as AI and IoT, collaboration systems such as business chat, cloud services, conferencing systems, and unified communications are rapidly becoming widely used as new IT applications in global corporations' strategic activities. Through in-depth longitudinal studies of global corporations, the book presents a new theoretical framework and implications for IT-enabled dynamic capabilities using collaboration systems from the perspective of micro strategy theory and organization theory. The content of the book is based on longitudinal analyses that employ various qualitative research methods including ethnography, participant observation, action research and in-depth case studies of global corporations in Europe, the United States and Asia that actively use collaboration systems. It presents a new concept of micro dynamism whereby dynamic "IT-enabled knowledge communities" such as "IT-enabled communities of practice" and "IT-enabled strategic communities" create "IT-enabled dynamic capabilities" through the integration of four research streams - an information systems view, micro strategy view, micro organization view and knowledge-based view. The book demonstrates that collaboration systems create, maintain and develop "IT-enabled knowledge communities" within companies and are strategic IT applications for enhancing the competitiveness of companies in the ongoing creation of new innovation and the realization of sustainable growth in a 21st century knowledge-based society. This book is primarily written for academics, researchers and graduate students, but will also offer practical implications for business leaders and managers. Its use is anticipated not only in business and management schools, graduate schools and university education environments around the world but also in the broad business environment including management and leadership development training.

Designing and Developing Secure Azure Solutions (Paperback): Michael Howard, Simone Curzi, Heinrich Gantenbein Designing and Developing Secure Azure Solutions (Paperback)
Michael Howard, Simone Curzi, Heinrich Gantenbein
R827 Discovery Miles 8 270 Ships in 12 - 17 working days

Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers- taking you from design and development to testing, deployment, governance, and compliance. About You This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible. Discover powerful new ways to: Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code Apply security patterns to solve common problems more easily Model threats early, to plan effective mitigations Implement modern identity solutions with OpenID Connect and OAuth2 Make the most of Azure monitoring, logging, and Kusto queries Safeguard workloads with Azure Security Benchmark (ASB) best practices Review secure coding principles, write defensive code, fix insecure code, and test code security Leverage Azure cryptography and confidential computing technologies Understand compliance and risk programs Secure CI / CD automated workflows and pipelines Strengthen container and network security

Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Paperback): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Paperback)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R1,397 Discovery Miles 13 970 Ships in 12 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

Slack For Dummies (Paperback): P. Simon Slack For Dummies (Paperback)
P. Simon
R637 R459 Discovery Miles 4 590 Save R178 (28%) Ships in 9 - 15 working days

You get so much more done when you Slack! Ever wondered what it would be like to be less overwhelmed, more efficient, and much more engaged at work? A way you can make all that happen is, of course, to Slack. Actually, it's to use Slack, the business communications platform that's revolutionized how groups work together. This comprehensive guide shows how--as well as why--there are now millions of users of this flexible, fun, and intuitive workspace tool. Presented in a clear, easy-to-follow style, Slack For Dummies takes you from the basics of getting started with the service all the way through how to get your teams Slacking together for all they're worth. You'll also find case studies showing how Slack increases productivity and how to replicate that in your organization, as well as tips on getting buy-in from the boss. Introduce Slack to your workflo wUnderstand roles and feature sAnalyze user dat aKeep your Slacking secure So, take a peek inside and discover how you can cut the slack using Slack--and clue your teams in on how there is actually a way to Slack off for improved results!

Network Automation Made Easy (Paperback): Ivo Pinto Network Automation Made Easy (Paperback)
Ivo Pinto
R1,220 Discovery Miles 12 200 Ships in 12 - 17 working days

Practical strategies and techniques for automating network infrastructure As networks grow ever more complex, network professionals are seeking to automate processes for configuration, management, testing, deployment, and operation. Using automation, they aim to lower expenses, improve productivity, reduce human error, shorten time to market, and improve agility. In this guide, expert practitioner Ivo Pinto presents all the concepts and techniques you'll need to move your entire physical and virtual infrastructure towards greater automation and maximize the value it delivers. Writing for experienced professionals, the author reviews today's leading use cases for automation, compares leading tools, and presents a deep dive into using the open source Ansible engine to automate common tasks. You'll find everything you need: from practical code snippets to real-world case studies to a complete methodology for planning strategy. This guide is for everyone seeking to improve network operations and productivity, including system, network, storage, and virtualization administrators, network and security engineers, and many other technical professionals and managers. You can apply its vendor-neutral concepts throughout your entire environment-from servers to the cloud, switches to security. Explore modern use cases for network automation, and compare today's most widely used automation tools Capture essential data for use in network automation, using standard formats such as JSON, XML, and YAML Get more value from the data your network can provide Install Ansible and master its building blocks, including plays, tasks, modules, variables, conditionals, loops, and roles Perform common networking tasks with Ansible playbooks: manage files, devices, VMs, cloud constructs, APIs, and more See how Ansible can be used to automate even the largest global network architectures Discover how NetDevOps can transform your approach to automation--and create a new NetDevOps pipeline, step by step Build a network automation strategy from the ground up, reflecting lessons from the world's largest enterprises

Programming Workflow Applications with Domino (Paperback): Richard Lam Programming Workflow Applications with Domino (Paperback)
Richard Lam
R1,814 Discovery Miles 18 140 Ships in 12 - 17 working days

This book introduces workflow application development in the Lotus Notes/Domino environment. Workflow concepts are explained and the Domino features are demonstrated for developing workflow-enabled applications. A complete, reusable, and customizable workflow application is provided, with annotated source code utilizing UML, XML, and Java. Illustrations throughout.

CompuServe 2000 Made Simple (Paperback): Keith Brindley CompuServe 2000 Made Simple (Paperback)
Keith Brindley
R422 Discovery Miles 4 220 Ships in 12 - 17 working days

Thousands of people have already discovered that Made Simple Computer Books gives them what they want fast! " I haven't found any other books worth recommending until these." " Clear, accurate, well presented, jargon free, well targeted." " Easy to follow to perform a task." " Ideal for the first time user." By a combination of tutorial approach, with tasks to do and easy steps, the MADE SIMPLE series of Computer Books from British publisher Butterworth-Heinemann, using British authors and designed for a European audience, stands above all others. Let this book, endorsed by CompuServe, as the official CompuServe book show you how to get the most out of CompuServe.

Modern Security Operations Center, The (Paperback): Joseph Muniz Modern Security Operations Center, The (Paperback)
Joseph Muniz
R1,279 Discovery Miles 12 790 Ships in 12 - 17 working days

The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible. Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation. This guide will be indispensable for everyone responsible for delivering security services-managers and cybersecurity professionals alike. * Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology * Identify, recruit, interview, onboard, and grow an outstanding SOC team * Thoughtfully decide what to outsource and what to insource * Collect, centralize, and use both internal data and external threat intelligence * Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts * Reduce future risk by improving incident recovery and vulnerability management * Apply orchestration and automation effectively, without just throwing money at them * Position yourself today for emerging SOC technologies

Integrated Networking, Caching, and Computing (Hardcover): F. Richard Yu, Tao Huang, Yunjie Liu Integrated Networking, Caching, and Computing (Hardcover)
F. Richard Yu, Tao Huang, Yunjie Liu
R2,642 Discovery Miles 26 420 Ships in 12 - 17 working days

This book features the major research advances on integrated networking, caching, and computing. Information-centric networking-based caching is one of the promising techniques for future networks. The cloud computing paradigm has been widely adopted to enable convenient, on-demand network access to a shared pool of configurable computing resources. In addition, fog/edge computing is proposed to deploy computing resources closer to end devices. From the perspective of applications, network, cache and compute are underlying enabling resources. How to manage, control and optimize these resources can have significant impacts on application performance.

Connecting Networks v6 Course Booklet (Paperback): Cisco Networking Academy Connecting Networks v6 Course Booklet (Paperback)
Cisco Networking Academy
R828 R149 Discovery Miles 1 490 Save R679 (82%) Ships in 9 - 15 working days

Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical: * The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the "Your Chapter Notes" section. * Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. * An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, watch videos, and take the chapter quizzes and exams. The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.

The Illustrated Network - How TCP/IP Works in a Modern Network (Paperback, 2nd edition): Walter Goralski The Illustrated Network - How TCP/IP Works in a Modern Network (Paperback, 2nd edition)
Walter Goralski
R2,580 R2,259 Discovery Miles 22 590 Save R321 (12%) Ships in 12 - 17 working days

The Illustrated Network: How TCP/IP Works in a Modern Network, Second Edition presents an illustrated explanation on how TCP/IP works, using consistent examples from a working network configuration that includes servers, routers and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to its title, there are 330+ diagrams and screenshots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. Based on examples of a complete and modern network, all the material comes from real objects connected and running on the network. The book emphasizes the similarities across all networks, since all share similar components, from the smallest LAN to the global internet. Layered protocols are the rule, and all hosts attached to the Internet run certain core protocols to enable their applications to function properly. This second edition includes updates throughout, along with four completely new chapters that introduce developments that have occurred since the publication of the first edition, including optical networking, cloud concepts and VXLAN.

Ransomware and Cyber Extortion - Response and Prevention (Paperback): Sherri Davidoff, Matt Durrin, Karen Sprenger Ransomware and Cyber Extortion - Response and Prevention (Paperback)
Sherri Davidoff, Matt Durrin, Karen Sprenger
R1,149 Discovery Miles 11 490 Ships in 9 - 15 working days

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source. Understand different forms of cyber extortion and how they evolved Quickly recognize indicators of compromise Minimize losses with faster triage and containment Identify threats, scope attacks, and locate "patient zero" Initiate and manage a ransom negotiation--and avoid costly mistakes Decide whether to pay, how to perform due diligence, and understand risks Know how to pay a ransom demand while avoiding common pitfalls Reduce risks of data loss and reinfection Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Microsoft Azure Sentinel - Planning and implementing Microsoft's cloud-native SIEM solution (Paperback, 2nd edition): Yuri... Microsoft Azure Sentinel - Planning and implementing Microsoft's cloud-native SIEM solution (Paperback, 2nd edition)
Yuri Diogenes, Nicholas DiCola, Tiander Turpijn
R916 R811 Discovery Miles 8 110 Save R105 (11%) Ships in 9 - 15 working days

Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you step-by-step through planning, deployment, and operations, helping you use Microsoft Sentinel to escape the complexity and scalability challenges of traditional solutions. Fully updated for the latest enhancements, this edition introduces new use cases for investigation, hunting, automation, and orchestration across your enterprise and all your clouds. The authors clearly introduce each service, concisely explain all new concepts, and present proven best practices for maximizing Microsoft Sentinel's value throughout security operations. Three of Microsoft's leading security operations experts show how to: Review emerging challenges that make better cyberdefense an urgent priority See how Microsoft Sentinel responds by unifying alert detection, threat visibility, proactive hunting, and threat response Explore components, architecture, design, and initial configuration Ingest alerts and raw logs from all sources you need to monitor Define and validate rules that prevent alert fatigue Use threat intelligence, machine learning, and automation to triage issues and focus on high-value tasks Add context with User and Entity Behavior Analytics (UEBA) and Watchlists Hunt sophisticated new threats to disrupt cyber kill chains before you're exploited Enrich incident management and threat hunting with Jupyter notebooks Use Playbooks to automate more incident handling and investigation tasks Create visualizations to spot trends, clarify relationships, and speed decisions Simplify integration with point-and-click data connectors that provide normalization, detection rules, queries, and Workbooks About This Book For cybersecurity analysts, security administrators, threat hunters, support professionals, engineers, and other IT professionals concerned with security operations For both Microsoft Azure and non-Azure users at all levels of experience

Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.): Kieran McCorry,... Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.)
Kieran McCorry, Donald Livengood
R1,629 Discovery Miles 16 290 Ships in 12 - 17 working days

Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios.
McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.

Detailed explanations of Active Directory integration with Exchange 2000, migration to Exchange 2000 from another system and Exchange 2000 transport, connectivity, and tools
Gives readers the benefit of authors' extensive experience
Unique description of the software "plumbing" organizations must master to move to Exchange 2000

DCOM Explained (Paperback): Rosemary Rock-Evans DCOM Explained (Paperback)
Rosemary Rock-Evans
R1,273 Discovery Miles 12 730 Ships in 12 - 17 working days

DCOM Explained describes what services DCOM provides, both development and runtime. Thus the aim of the book is not to teach how to program using DCOM, but to explain what DCOM does so readers will become better able to use it more effectively, understand the options available when using DCOM, and understand the types of applications that can be built by using DCOM.
This book describes:
. what each of the services mean, including load balancing, security, guaranteed delivery, deferred delivery, broadcasting and multi-casting, and session handling.
. what the service aims to do, such as saving time and effort or providing a secure, resilient, reliable, high performance network
. how the service could be provided, and what other solutions exist for achieving the same end
. how Microsoft has tackled the problem

Provides a complete, easy to understand, and compact picture of all the services of DCOM
Written from a designer or manager's point of view
Compares DCOM with other middleware"

Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers (Paperback): Simone Arena, Nicolas Darchis,... Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers (Paperback)
Simone Arena, Nicolas Darchis, Sudha Katgeri, Francisco Crippa
R1,582 Discovery Miles 15 820 Ships in 9 - 15 working days

The definitive professional's guide to the Cisco next-gen 9800 wireless controllers As wireless networks, applications, and services rapidly evolve, they grow increasingly business critical, with steeper requirements for performance, latency, deployment density, and device support. The advanced Catalyst 9800 wireless controllers from Cisco meet these challenges, delivering exceptional adaptability, security, performance, scalability, and programmability. Based on the modern and secure Cisco IOS XE operating system, their support for Cisco intent-based networking will help you continually leverage new innovation. Now, four Cisco experts offer end-to-end guidance, practical tips, and proven recommendations for designing, deploying, and managing wireless networks with the Catalyst 9800. For technical decision makers, this guide delivers a deep understanding of Catalyst 9800 hardware and software, tightly linked to business value. Architects will find essential details for both upfront network design and feature implementation. Network operators and other IT professionals will discover tested tools and methods for reliable and efficient setup, configuration, monitoring, and troubleshooting. Whatever your role, this guide will help you maximize the value of any Catalyst 9800 network, and serve as your indispensable reference for years to come. Understand Catalyst 9800 benefits, capabilities, roles, and architecture Learn the new C9800 Configuration Model, with key design considerations and best practices Deploy and configure the C9800 in private and public clouds Systematically secure the C9800: from AAA and ACLs to rogue detection and wireless intrusion prevention (WIPS) Establish and optimize seamless client roaming in enterprise environments Learn how the C9800 implements key RF concepts Plan and implement an end-to-end architecture for QoS, and design/ deploy for high availability and network services like multicast Discover value-added wireless services available through Cisco DNA Spaces Drive agility and value via network programmability with YANG, Python, RESTCONF, and NETCONF Make the most out of the rich data models of Model-Driven Telemetry and Programmability using open-source tools Walk through wireless network troubleshooting, backup/restore, and upgrades

Practical .NET 2.0 Networking Projects (Paperback, 1st ed.): Wei-Meng Lee Practical .NET 2.0 Networking Projects (Paperback, 1st ed.)
Wei-Meng Lee
R1,064 R860 Discovery Miles 8 600 Save R204 (19%) Ships in 10 - 15 working days

"Practical .NET 2.0 Networking Projects" demonstrates some of the key networking technologies that are being made easily accessible through .NET Framework 2.0. It discusses communication between wired machines and between networks and mobile devices. The book teaches you about the technologies by walking you through sample projects in a straightforward and direct way.

The book begins by discussing background theory so youll get comfortable with the layout of the .NET Framework and Compact Framework from a networking perspective. Then youll use the APIs within these frameworks to build a variety of cutting-edge networking applications that cover everything from Bluetooth and RFID communication to sockets programming and chat servers. Youll build working examples for each project, which you can also customize and use for your own purposes. The featured projects cover Basic introduction to network programming in .NET 2.0 Sockets programming Serial communication Bluetooth and GPS Infrared networking to mobile devices RFID

Enterprise Integration Patterns - Designing, Building, And Deploying Messaging Solutions (Hardcover): Bobby Woolf, Gregor Hohpe Enterprise Integration Patterns - Designing, Building, And Deploying Messaging Solutions (Hardcover)
Bobby Woolf, Gregor Hohpe
R1,862 R1,451 Discovery Miles 14 510 Save R411 (22%) Ships in 12 - 17 working days

Would you like to use a consistent visual notation for drawing integration solutions? "Look inside the front cover."Do you want to harness the power of asynchronous systems without getting caught in the pitfalls? "See "Thinking Asynchronously" in the Introduction."Do you want to know which style of application integration is best for your purposes? "See Chapter 2, Integration Styles."Do you want to learn techniques for processing messages concurrently? "See Chapter 10, Competing Consumers and Message Dispatcher."Do you want to learn how you can track asynchronous messages as they flow across distributed systems? "See Chapter 11, Message History and Message Store."Do you want to understand how a system designed using integration patterns can be implemented using Java Web services, .NET message queuing, and a TIBCO-based publish-subscribe architecture? "See Chapter 9, Interlude: Composed Messaging."

Utilizing years of practical experience, seasoned experts Gregor Hohpe and Bobby Woolf show how asynchronous messaging has proven to be the best strategy for enterprise integration success. However, building and deploying messaging solutions presents a number of problems for developers. "Enterprise Integration Patterns" provides an invaluable catalog of sixty-five patterns, with real-world solutions that demonstrate the formidable of messaging and help you to design effective messaging solutions for your enterprise.

The authors also include examples covering a variety of different integration technologies, such as JMS, MSMQ, TIBCO ActiveEnterprise, Microsoft BizTalk, SOAP, and XSL. A case study describing a bond trading system illustrates the patterns in practice, and the book offers alook at emerging standards, as well as insights into what the future of enterprise integration might hold.

This book provides a consistent vocabulary and visual notation framework to describe large-scale integration solutions across many technologies. It also explores in detail the advantages and limitations of asynchronous messaging architectures. The authors present practical advice on designing code that connects an application to a messaging system, and provide extensive information to help you determine when to send a message, how to route it to the proper destination, and how to monitor the health of a messaging system. If you want to know how to manage, monitor, and maintain a messaging system once it is in use, get this book.
0321200683B09122003

Computer Security Fundamentals (Paperback, 5th edition): William Easttom Computer Security Fundamentals (Paperback, 5th edition)
William Easttom
R1,779 Discovery Miles 17 790 Ships in 12 - 17 working days

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. LEARN HOW TO Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against today's most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if you're attacked Learn how cyberterrorism and information warfare are evolving

Cybersecurity Myths and Misconceptions - Avoiding the Hazards and Pitfalls that Derail Us (Paperback): Eugene Spafford, Leigh... Cybersecurity Myths and Misconceptions - Avoiding the Hazards and Pitfalls that Derail Us (Paperback)
Eugene Spafford, Leigh Metcalf, Josiah Dykstra
R897 Discovery Miles 8 970 Ships in 12 - 17 working days

175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses. Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them. Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best? Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader. Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. "You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it." --From the Foreword by Vint Cerf, Internet Hall of Fame Pioneer Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Unblockchain - A Brain-Friendly Guide for Blockchain, from Bitcoin to Ethereum Deep-Dive (Paperback): Henrique Centieiro Unblockchain - A Brain-Friendly Guide for Blockchain, from Bitcoin to Ethereum Deep-Dive (Paperback)
Henrique Centieiro
R579 Discovery Miles 5 790 Ships in 10 - 15 working days
OpenShift Multi-Cluster Management Handbook - Go from architecture to pipelines using GitOps (Paperback): Giovanni Fontana,... OpenShift Multi-Cluster Management Handbook - Go from architecture to pipelines using GitOps (Paperback)
Giovanni Fontana, Rafael Pecora, Marcos Amorim
R1,121 Discovery Miles 11 210 Ships in 10 - 15 working days

Discover best practices for designing and scaling robust OpenShift clusters' architecture for different workloads Manage multiple clusters on-premise or in the cloud using multi-cluster management tools to keep them secure and compliant Implement multi-cluster CI/CD on OpenShift using GitOps Key Features Discover best practices to design robust OpenShift architecture and scale them to different workloads Understand the minimal collection of topics you should consider in your container security strategy Implement multi-cluster CI/CD on OpenShift using GitOps Book DescriptionFor IT professionals working with Red Hat OpenShift Container Platform, the key to maximizing efficiency is understanding the powerful and resilient options to maintain the software development platform with minimal effort. OpenShift Multi-Cluster Management Handbook is a deep dive into the technology, containing knowledge essential for anyone who wants to work with OpenShift. This book starts by covering the architectural concepts and definitions necessary for deploying OpenShift clusters. It then takes you through designing Red Hat OpenShift for hybrid and multi-cloud infrastructure, showing you different approaches for multiple environments (from on-premises to cloud providers). As you advance, you'll learn container security strategies to protect pipelines, data, and infrastructure on each layer. You'll also discover tips for critical decision making once you understand the importance of designing a comprehensive project considering all aspects of an architecture that will allow the solution to scale as your application requires. By the end of this OpenShift book, you'll know how to design a comprehensive Red Hat OpenShift cluster architecture, deploy it, and effectively manage your enterprise-grade clusters and other critical components using tools in OpenShift Plus. What you will learn Understand the important aspects of OpenShift cluster architecture Design your infrastructure to run across hybrid clouds Define the best strategy for multitenancy on OpenShift Discover efficient troubleshooting strategies with OpenShift Build and deploy your applications using OpenShift Pipelines (Tekton) Work with ArgoCD to deploy your applications using GitOps practices Monitor your clusters' security using Red Hat Advanced Cluster Security Who this book is forThis book is for a wide range of IT professionals using or looking to use OpenShift with a hybrid/multi-cloud approach. In this book, IT architects will find practical guidance on OpenShift clusters' architecture, while Sysadmins, SREs, and IT operators will learn more about OpenShift deployment, troubleshooting, networking, security, and tools to manage multiple clusters from a single pane. For DevOps engineers, this book covers CI/CD strategies for multiple clusters using GitOps. Equipped with just basic knowledge of containerization and Kubernetes, you're ready to get started.

Seniors Guide to iPhone 12 Pro and 12 Pro Max Cameras - Seniors Guide to Shooting Professional photographs and Cinematic Videos... Seniors Guide to iPhone 12 Pro and 12 Pro Max Cameras - Seniors Guide to Shooting Professional photographs and Cinematic Videos on the iPhone 12 Pro and 12 Pro Max (Paperback)
Konrad Christopher
R404 Discovery Miles 4 040 Ships in 10 - 15 working days
Google Drive Made Easy - Online Storage and Sharing the Easy Way (Paperback): James Bernstein Google Drive Made Easy - Online Storage and Sharing the Easy Way (Paperback)
James Bernstein
R398 Discovery Miles 3 980 Ships in 10 - 15 working days
Microsoft Office 365 and SharePoint Online Cookbook - - An all-in-one guide to Microsoft 365 workloads, including SharePoint,... Microsoft Office 365 and SharePoint Online Cookbook - - An all-in-one guide to Microsoft 365 workloads, including SharePoint, Microsoft Teams, Power Platform, and more (Paperback, 2nd Revised edition)
Gaurav Mahajan, Sudeep Ghatak, Nate Chamberlain, Scott Brewster
R1,195 Discovery Miles 11 950 Ships in 10 - 15 working days

With over 100 practical recipes that offer extensive coverage of Microsoft 365, learn how to enhance collaboration, implement RPA, and develop business intelligence for your organization -with an accompanying eBook for extra coverage. Key Features * Enhanced focus on core topics for SharePoint Online, Power Platform, and Microsoft Teams * Collaborate with your team and external users effectively using MS Teams * Create low-code solutions such as bots, forms, dashboards, and workflows using the Power Platform. Book Description Microsoft 365 provides tools for managing organizational tasks like content management, communication, report creation, and business automation processes. With this book, you'll get to grips with enabling workspace collaboration and productivity using Microsoft SharePoint Online, Teams, and the Power Platform. Featuring an additional online resource introducing popular Microsoft apps such as To Do, Viva Insights, and Viva Learning. In addition to guiding you through the implementation of Microsoft 365 apps, this practical guide helps you to learn from a Microsoft consultant's extensive experience of working with the Microsoft business suite. This cookbook covers recipes for implementing SharePoint Online for various content management tasks. You'll learn how to create sites for your organization and enhance collaboration across the business and then see how you can boost productivity with apps such as Microsoft Teams, Power Platform, Planner, Delve, and M365 Groups. You'll find out how to use the Power Platform step-by-step, making the most of Power Apps, Power Automate, Power BI, and Power Virtual Agents. Finally, the book focuses on the SharePoint framework, which helps you to build custom Teams and SharePoint solutions. By the end of the book, you will be ready to use Microsoft 365 and SharePoint Online to enhance business productivity using a broad set of tools What you will learn * Discover the new employee experience application, Microsoft Viva * Use Microsoft Forms to create polls, surveys, tests, and quizzes * Encounter a wide range of apps and cloud services in Microsoft 365 * Discover how to use SharePoint Online to create and manage content * Store and share documents using SharePoint Online * Improve your search experience with Microsoft Search * Build business solutions with extra coverage of the Power Platform * Enhance capabilities in Teams using the SharePoint Framework (SPFx) Who This Book Is For This book is for business professionals, IT administrators, enterprise developers and architects, and anyone who is new to using MS 365 for the effective implementation of Microsoft apps. Prior experience with Office 365 and SharePoint will assist with understanding the recipes effortlessly, but is not required.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
S5000F, International specification for…
Asd Hardcover R1,261 Discovery Miles 12 610
Getting Started with Zoom
Scott La Counte Paperback R477 Discovery Miles 4 770
S5000F, International specification for…
Asd Hardcover R1,153 Discovery Miles 11 530
Enhancing Productivity with Notion…
Danny Hatcher Paperback R714 Discovery Miles 7 140
Adaptive Information - Improving…
JT Pollock Hardcover R3,726 Discovery Miles 37 260
Zoho One Essentials - Mastering Zoho CRM
Karen S. Fredricks Paperback R688 Discovery Miles 6 880
Demystifying SaaS-based PLM - Cloud and…
Michael Finocchiaro Paperback R488 Discovery Miles 4 880
Jira Work Management for Business Teams…
John Funk Paperback R804 Discovery Miles 8 040
The Digital Notebook - One Note in…
Ina Koys Paperback R205 R171 Discovery Miles 1 710
Microsoft Teams For Teachers - A Quick…
Catherine Corley Paperback R342 Discovery Miles 3 420

 

Partners