0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (6)
  • R250 - R500 (17)
  • R500+ (127)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking packages

Google Drive & Docs In 30 Minutes - The unofficial guide to Google Drive, Docs, Sheets & Slides (Hardcover, 3rd Revised and... Google Drive & Docs In 30 Minutes - The unofficial guide to Google Drive, Docs, Sheets & Slides (Hardcover, 3rd Revised and Updated ed.)
Ian Lamont
R583 Discovery Miles 5 830 Ships in 10 - 15 working days
S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 2/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,042 Discovery Miles 10 420 Ships in 18 - 22 working days
S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,137 Discovery Miles 11 370 Ships in 18 - 22 working days
The Illustrated Network - How TCP/IP Works in a Modern Network (Paperback, 2nd edition): Walter Goralski The Illustrated Network - How TCP/IP Works in a Modern Network (Paperback, 2nd edition)
Walter Goralski
R2,378 R2,152 Discovery Miles 21 520 Save R226 (10%) Ships in 10 - 15 working days

The Illustrated Network: How TCP/IP Works in a Modern Network, Second Edition presents an illustrated explanation on how TCP/IP works, using consistent examples from a working network configuration that includes servers, routers and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to its title, there are 330+ diagrams and screenshots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. Based on examples of a complete and modern network, all the material comes from real objects connected and running on the network. The book emphasizes the similarities across all networks, since all share similar components, from the smallest LAN to the global internet. Layered protocols are the rule, and all hosts attached to the Internet run certain core protocols to enable their applications to function properly. This second edition includes updates throughout, along with four completely new chapters that introduce developments that have occurred since the publication of the first edition, including optical networking, cloud concepts and VXLAN.

Networking Essentials Companion Guide (Hardcover): Cisco Networking Academy Networking Essentials Companion Guide (Hardcover)
Cisco Networking Academy
R1,628 Discovery Miles 16 280 Ships in 10 - 15 working days

Networking Essentials Companion Guide is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy. Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it's important to understand what the network can do, how it operates, and how to protect it. This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It's also an excellent launching point for students pursuing a wide range of career pathways-from cybersecurity to software development to business and more. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course: * Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter. * Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. * Glossary: Consult the comprehensive Glossary with more than 250 terms. * Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. * Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.): Kieran McCorry,... Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.)
Kieran McCorry, Donald Livengood
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios.
McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.

Detailed explanations of Active Directory integration with Exchange 2000, migration to Exchange 2000 from another system and Exchange 2000 transport, connectivity, and tools
Gives readers the benefit of authors' extensive experience
Unique description of the software "plumbing" organizations must master to move to Exchange 2000

DCOM Explained (Paperback): Rosemary Rock-Evans DCOM Explained (Paperback)
Rosemary Rock-Evans
R1,224 Discovery Miles 12 240 Ships in 10 - 15 working days

DCOM Explained describes what services DCOM provides, both development and runtime. Thus the aim of the book is not to teach how to program using DCOM, but to explain what DCOM does so readers will become better able to use it more effectively, understand the options available when using DCOM, and understand the types of applications that can be built by using DCOM.
This book describes:
. what each of the services mean, including load balancing, security, guaranteed delivery, deferred delivery, broadcasting and multi-casting, and session handling.
. what the service aims to do, such as saving time and effort or providing a secure, resilient, reliable, high performance network
. how the service could be provided, and what other solutions exist for achieving the same end
. how Microsoft has tackled the problem

Provides a complete, easy to understand, and compact picture of all the services of DCOM
Written from a designer or manager's point of view
Compares DCOM with other middleware"

Scaling Networks v6 Labs & Study Guide (Paperback): Cisco Networking Academy, Allan Johnson Scaling Networks v6 Labs & Study Guide (Paperback)
Cisco Networking Academy, Allan Johnson
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

Lab Manuals provide students enrolled in a Cisco Networking Academy course of the same name with a convenient, complete collection of all the course lab exercises that provide hands-on practice and challenges. The only authorized Labs & Study Guide for the Cisco Networking Academy Routing and Switching Essentials course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.

Enterprise Architecture for Connected E-Government - Practices and Innovations (Hardcover, New): Pallab Saha Enterprise Architecture for Connected E-Government - Practices and Innovations (Hardcover, New)
Pallab Saha
R4,680 Discovery Miles 46 800 Ships in 18 - 22 working days

Enterprise Architecture is the inherent design and management approach essential for organizational coherence leading to alignment, agility, and assurance. Structured Enterprise Architecture approach is often used to plan and implement efficient and effective transformation efforts. However, the strongest driver for Enterprise Architecture is to improve service delivery and overall performance within the organization's business segments. Enterprise Architecture for Connected E-Government: Practices and Innovations addresses the gap in current literature in terms of linking and understanding the relationship between e-government and government Enterprise Architecture. Within this broader context, the focus is specifically on uncovering and comprehending the relationship between government Enterprise Architecture and connected government. Perfect for Government CIOs, IT/IS Managers, Chief Architects, Analysts and Designers seeking better, quicker, and easier approaches to respond to needs of their internal and external customers.

Collaborative and Distributed E-Research - Innovations in Technologies, Strategies, and Applications (Hardcover, New): Angel A... Collaborative and Distributed E-Research - Innovations in Technologies, Strategies, and Applications (Hardcover, New)
Angel A Juan, Thanasis Daradoumis, Meritxell Roca, Scott E. Grasman, Javier Faulin
R4,968 Discovery Miles 49 680 Ships in 18 - 22 working days

Technology has made it possible to conduct research and form research groups that are not limited by geographic location. The field of Collaborative and Distributed E-Research (CDER) studies this phenomenon, specifically focusing on the use of the Internet and Information Technology (IT) to develop international and distributed scientific research. Collaborative and Distributed E-Research: Innovations in Technologies, Strategies and Applications offers insight into practical and methodological issues related to collaborative e-research and furthers our understanding of current and future trends in online research and the types of technologies involved. This book provides a useful foundation for academics and professionals involved in Collaborative and Distributed E-Research, collaborative software development, and computer-supported collaborative work.

Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies (Hardcover, New): Ned Kock Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies (Hardcover, New)
Ned Kock
R4,441 Discovery Miles 44 410 Ships in 18 - 22 working days

With the advent and advancement of E-Collaboration tools, our way of social interaction and online social behavior has altered drastically. With new ways of communicating and working together, we must understand how this affects human behavior. Interdisciplinary Applications of Electronic Collaboration Approaches and Technologies addresses the design and implementation of e-collaboration technologies, assesses its behavioral impact on individuals and groups, and presents theoretical considerations on links between the use of e-collaboration technologies and behavioral patterns. An innovative collection of the latest research findings, this book covers significant topics such as Web-based chat tools, Web-based asynchronous conferencing tools, e-mail, listservs and many others, perfect for academics, researchers, and professionals alike.

Ransomware and Cyber Extortion - Response and Prevention (Paperback): Sherri Davidoff, Matt Durrin, Karen Sprenger Ransomware and Cyber Extortion - Response and Prevention (Paperback)
Sherri Davidoff, Matt Durrin, Karen Sprenger
R1,068 R975 Discovery Miles 9 750 Save R93 (9%) Ships in 9 - 17 working days

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source. Understand different forms of cyber extortion and how they evolved Quickly recognize indicators of compromise Minimize losses with faster triage and containment Identify threats, scope attacks, and locate "patient zero" Initiate and manage a ransom negotiation--and avoid costly mistakes Decide whether to pay, how to perform due diligence, and understand risks Know how to pay a ransom demand while avoiding common pitfalls Reduce risks of data loss and reinfection Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers (Paperback): Simone Arena, Nicolas Darchis,... Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers (Paperback)
Simone Arena, Nicolas Darchis, Sudha Katgeri, Francisco Crippa
R1,296 R1,172 Discovery Miles 11 720 Save R124 (10%) Ships in 9 - 17 working days

The definitive professional's guide to the Cisco next-gen 9800 wireless controllers As wireless networks, applications, and services rapidly evolve, they grow increasingly business critical, with steeper requirements for performance, latency, deployment density, and device support. The advanced Catalyst 9800 wireless controllers from Cisco meet these challenges, delivering exceptional adaptability, security, performance, scalability, and programmability. Based on the modern and secure Cisco IOS XE operating system, their support for Cisco intent-based networking will help you continually leverage new innovation. Now, four Cisco experts offer end-to-end guidance, practical tips, and proven recommendations for designing, deploying, and managing wireless networks with the Catalyst 9800. For technical decision makers, this guide delivers a deep understanding of Catalyst 9800 hardware and software, tightly linked to business value. Architects will find essential details for both upfront network design and feature implementation. Network operators and other IT professionals will discover tested tools and methods for reliable and efficient setup, configuration, monitoring, and troubleshooting. Whatever your role, this guide will help you maximize the value of any Catalyst 9800 network, and serve as your indispensable reference for years to come. Understand Catalyst 9800 benefits, capabilities, roles, and architecture Learn the new C9800 Configuration Model, with key design considerations and best practices Deploy and configure the C9800 in private and public clouds Systematically secure the C9800: from AAA and ACLs to rogue detection and wireless intrusion prevention (WIPS) Establish and optimize seamless client roaming in enterprise environments Learn how the C9800 implements key RF concepts Plan and implement an end-to-end architecture for QoS, and design/ deploy for high availability and network services like multicast Discover value-added wireless services available through Cisco DNA Spaces Drive agility and value via network programmability with YANG, Python, RESTCONF, and NETCONF Make the most out of the rich data models of Model-Driven Telemetry and Programmability using open-source tools Walk through wireless network troubleshooting, backup/restore, and upgrades

Foundations of AOP for J2EE Development (Hardcover, 1st ed.): Lionel Seinturier, Renaud Pawlak Foundations of AOP for J2EE Development (Hardcover, 1st ed.)
Lionel Seinturier, Renaud Pawlak
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

"Foundations of AOP for J2EE Development" covers a relatively new programming paradigm: aspect-oriented programming, or AOP. Presented are the core concepts of AOP: AspectJ 5, JBoss AOP, Spring AOP, and JAC. Specific features of these tools are compared. The book also explores the potential uses of AOP in everyday programming life, such as design patterns implementation, program testing, and application management.

In the latter part of the book, the authors show how AOP can ease the task of J2EE application development. (J2EE is known for being a rich and somewhat complicated framework.)

Managing IT for Innovation - Dynamic Capabilities and Competitive Advantage (Paperback): Mitsuru Kodama Managing IT for Innovation - Dynamic Capabilities and Competitive Advantage (Paperback)
Mitsuru Kodama
R1,255 Discovery Miles 12 550 Ships in 10 - 15 working days

With recent advances in IT in areas such as AI and IoT, collaboration systems such as business chat, cloud services, conferencing systems, and unified communications are rapidly becoming widely used as new IT applications in global corporations' strategic activities. Through in-depth longitudinal studies of global corporations, the book presents a new theoretical framework and implications for IT-enabled dynamic capabilities using collaboration systems from the perspective of micro strategy theory and organization theory. The content of the book is based on longitudinal analyses that employ various qualitative research methods including ethnography, participant observation, action research and in-depth case studies of global corporations in Europe, the United States and Asia that actively use collaboration systems. It presents a new concept of micro dynamism whereby dynamic "IT-enabled knowledge communities" such as "IT-enabled communities of practice" and "IT-enabled strategic communities" create "IT-enabled dynamic capabilities" through the integration of four research streams - an information systems view, micro strategy view, micro organization view and knowledge-based view. The book demonstrates that collaboration systems create, maintain and develop "IT-enabled knowledge communities" within companies and are strategic IT applications for enhancing the competitiveness of companies in the ongoing creation of new innovation and the realization of sustainable growth in a 21st century knowledge-based society. This book is primarily written for academics, researchers and graduate students, but will also offer practical implications for business leaders and managers. Its use is anticipated not only in business and management schools, graduate schools and university education environments around the world but also in the broad business environment including management and leadership development training.

Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Paperback): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Paperback)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R1,288 Discovery Miles 12 880 Ships in 9 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

Computer Security Fundamentals (Paperback, 5th edition): William Easttom Computer Security Fundamentals (Paperback, 5th edition)
William Easttom
R1,815 R1,474 Discovery Miles 14 740 Save R341 (19%) Ships in 5 - 10 working days

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. LEARN HOW TO Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against today's most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if you're attacked Learn how cyberterrorism and information warfare are evolving

Cybersecurity Myths and Misconceptions - Avoiding the Hazards and Pitfalls that Derail Us (Paperback): Eugene Spafford, Leigh... Cybersecurity Myths and Misconceptions - Avoiding the Hazards and Pitfalls that Derail Us (Paperback)
Eugene Spafford, Leigh Metcalf, Josiah Dykstra
R935 R799 Discovery Miles 7 990 Save R136 (15%) Ships in 5 - 10 working days

175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses. Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them. Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best? Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader. Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. "You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. . . . Read the book, laugh at the right places, and put your learning to work. You won't regret it." --From the Foreword by Vint Cerf, Internet Hall of Fame Pioneer Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Introduction to Networks v6 Labs & Study Guide (Paperback): Allan Johnson, Cisco Networking Academy Introduction to Networks v6 Labs & Study Guide (Paperback)
Allan Johnson, Cisco Networking Academy
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

The only authorized Labs & Study Guide for the Cisco Networking Academy Introduction to Networks course in the CCNA Routing and Switching curriculum Each chapter of this book is divided into a Study Guide section followed by a Lab section. The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCENT exam candidate. Each chapter is slightly different and includes some or all the following types of exercises: * Vocabulary Matching Exercises * Concept Questions Exercises * Skill-Building Activities and Scenarios * Configuration Scenarios * Packet Tracer Exercises * Troubleshooting Scenarios The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.

Microsoft Defender for Cloud (Paperback): Yuri Diogenes, Tom Janetscheck Microsoft Defender for Cloud (Paperback)
Yuri Diogenes, Tom Janetscheck
R776 Discovery Miles 7 760 Ships in 10 - 15 working days

The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management - all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms. This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors. Sharing best practices, expert tips, and optimizations only available from Microsoft's Defender for Cloud team, the authors walk through improving everything from policies and governance to incident response and risk management. Whatever your role or experience, they'll help you address new security challenges far more effectively-and save hours, days, or even weeks. Two of Microsoft's leading cloud security experts show how to: Assess new threat landscapes, the MITRE ATT&CK framework, and the implications of ''assume-breach'' Explore Defender for Cloud architecture, use cases, and adoption considerations including multicloud with AWS and GCP Plan for effective governance, successful onboarding, and maximum value Fully visualize complex cloud estates and systematically reduce their attack surfaces Prioritize risks with Secure Score, and leverage at-scale tools to build secure cloud-native apps Establish consistent policy enforcement to avoid drift Use advanced analytics and machine learning to identify attacks based on signals from all cloud workloads Enhance security posture by integrating with the Microsoft Sentinel SIEM/SOAR, Microsoft Purview, and Microsoft Defender for Endpoint Leverage just-in-time VM access and other enhanced security capabilities About This Book For architects, designers, implementers, SecOps professionals, developers, and security specialists working in Microsoft Azure environments For all IT professionals and decision-makers concerned with securing modern hybrid/multicloud environments, cloud-native apps, and PaaS services

Designing and Developing Secure Azure Solutions (Paperback): Michael Howard, Simone Curzi, Heinrich Gantenbein Designing and Developing Secure Azure Solutions (Paperback)
Michael Howard, Simone Curzi, Heinrich Gantenbein
R860 Discovery Miles 8 600 Ships in 10 - 15 working days

Plan, build, and maintain highly secure Azure applications and workloads As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers- taking you from design and development to testing, deployment, governance, and compliance. About You This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible. Discover powerful new ways to: Improve app / workload security, reduce attack surfaces, and implement zero trust in cloud code Apply security patterns to solve common problems more easily Model threats early, to plan effective mitigations Implement modern identity solutions with OpenID Connect and OAuth2 Make the most of Azure monitoring, logging, and Kusto queries Safeguard workloads with Azure Security Benchmark (ASB) best practices Review secure coding principles, write defensive code, fix insecure code, and test code security Leverage Azure cryptography and confidential computing technologies Understand compliance and risk programs Secure CI / CD automated workflows and pipelines Strengthen container and network security

Microsoft Azure Security Infrastructure (Paperback): Yuri Diogenes, Tom Shinder, Debra Shinder Microsoft Azure Security Infrastructure (Paperback)
Yuri Diogenes, Tom Shinder, Debra Shinder
R611 Discovery Miles 6 110 Ships in 10 - 15 working days

Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: * Understand cloud security boundaries and responsibilities * Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection * Explore Azure's defense-in-depth security architecture * Use Azure network security patterns and best practices * Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security * Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines * Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information * Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite * Effectively model threats and plan protection for IoT systems * Use Azure security tools for operations, incident response, and forensic investigation

CompuServe 2000 Made Simple (Paperback): Keith Brindley CompuServe 2000 Made Simple (Paperback)
Keith Brindley
R498 Discovery Miles 4 980 Ships in 10 - 15 working days

Thousands of people have already discovered that Made Simple Computer Books gives them what they want fast! " I haven't found any other books worth recommending until these." " Clear, accurate, well presented, jargon free, well targeted." " Easy to follow to perform a task." " Ideal for the first time user." By a combination of tutorial approach, with tasks to do and easy steps, the MADE SIMPLE series of Computer Books from British publisher Butterworth-Heinemann, using British authors and designed for a European audience, stands above all others. Let this book, endorsed by CompuServe, as the official CompuServe book show you how to get the most out of CompuServe.

Programming Workflow Applications with Domino (Paperback): Richard Lam Programming Workflow Applications with Domino (Paperback)
Richard Lam
R1,790 Discovery Miles 17 900 Ships in 10 - 15 working days

This book introduces workflow application development in the Lotus Notes/Domino environment. Workflow concepts are explained and the Domino features are demonstrated for developing workflow-enabled applications. A complete, reusable, and customizable workflow application is provided, with annotated source code utilizing UML, XML, and Java. Illustrations throughout.

Slack For Dummies (Paperback): P. Simon Slack For Dummies (Paperback)
P. Simon
R506 Discovery Miles 5 060 Ships in 10 - 15 working days

You get so much more done when you Slack! Ever wondered what it would be like to be less overwhelmed, more efficient, and much more engaged at work? A way you can make all that happen is, of course, to Slack. Actually, it's to use Slack, the business communications platform that's revolutionized how groups work together. This comprehensive guide shows how--as well as why--there are now millions of users of this flexible, fun, and intuitive workspace tool. Presented in a clear, easy-to-follow style, Slack For Dummies takes you from the basics of getting started with the service all the way through how to get your teams Slacking together for all they're worth. You'll also find case studies showing how Slack increases productivity and how to replicate that in your organization, as well as tips on getting buy-in from the boss. Introduce Slack to your workflo wUnderstand roles and feature sAnalyze user dat aKeep your Slacking secure So, take a peek inside and discover how you can cut the slack using Slack--and clue your teams in on how there is actually a way to Slack off for improved results!

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Adaptive Information - Improving…
JT Pollock Hardcover R3,538 Discovery Miles 35 380
Integrated Networking, Caching, and…
F. Richard Yu, Tao Huang, … Hardcover R2,516 Discovery Miles 25 160
Network Automation Made Easy
Ivo Pinto Paperback R1,174 Discovery Miles 11 740
Right Way to Select Technology - Get the…
Tony Byrne, Jarrod Gingras Paperback R699 Discovery Miles 6 990
Apache Tomcat 7
Aleksa Vukotic, James Goodwill Paperback R1,993 Discovery Miles 19 930
Microsoft Azure Sentinel - Planning and…
Yuri Diogenes, Nicholas DiCola, … Paperback R694 Discovery Miles 6 940
Middleware 2007 - ACM/IFIP/USENIX 8th…
Renato Cerqueira, Roy H. Campbell Paperback R1,455 Discovery Miles 14 550
Foundations Of BizTalk Server 2006
Daniel Woolston Paperback R899 R778 Discovery Miles 7 780
Practical .NET 2.0 Networking Projects
Wei-Meng Lee Paperback R908 R787 Discovery Miles 7 870
Middleware 2006 - ACM/IFIP/USENIX 7th…
Maarten Van Steen, Michi Henning Paperback R1,575 Discovery Miles 15 750

 

Partners