0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (176)
  • R250 - R500 (203)
  • R500+ (846)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover): Patricia Diaz, William C. Long Data Security Breaches - Notification Laws, Legislation & Identity Theft (Hardcover)
Patricia Diaz, William C. Long
R3,043 R2,761 Discovery Miles 27 610 Save R282 (9%) Ships in 12 - 17 working days

A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data. This book provides an overview of state security breach notification laws applicable to entities that collect, maintain, own, possess, or license personal information. This book describes information security and security breach notification requirements in the Office of Management and Budget's "Breach Notification Policy," the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Gramm-Leach-Bliley Act (GLBA).

Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover): Larry A Schwartz Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover)
Larry A Schwartz
R3,775 Discovery Miles 37 750 Ships in 12 - 17 working days

In today's world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 3 (Hardcover)
Information R Management Association
R13,049 Discovery Miles 130 490 Ships in 10 - 15 working days
Privacy and the Media (Paperback): Andrew McStay Privacy and the Media (Paperback)
Andrew McStay
R851 Discovery Miles 8 510 Ships in 12 - 17 working days

Questions of privacy are critical to the study of contemporary media and society. When we're more and more connected to devices and to content, it's increasingly important to understand how information about ourselves is being collected, transmitted, processed, and mediated. Privacy and the Media equips students to do just that, providing a comprehensive overview of both the theory and reality of privacy and the media in the 21st Century. Offering a rich overview of this crucial and topical relationship, Andy McStay: Explores the foundational topics of journalism, the Snowden leaks, and encryption by companies such as Apple Considers commercial applications including behavioural advertising, big data, algorithms, and the role of platforms such as Google and Facebook Introduces the role of the body with discussions of emotion, wearable media, peer-based privacy, and sexting Encourages students to put their understanding to work with suggestions for further research, challenging them to explore how privacy functions in practice. Privacy and the Media is not a polemic on privacy as 'good' or 'bad', but a call to assess the detail and the potential implications of contemporary media technologies and practices. It is essential reading for students and researchers of digital media, social media, digital politics, and the creative and cultural industries. 'Privacy and the Media is a thoughtful survey of the privacy landscape. McStay reviews the intricate tensions and seeming contradictions to offer an accessible book for anyone curious about the contemporary debates in privacy.' - danah boyd, author of It's Complicated and founder of Data & Society 'McStay's great achievement here is to confront many of the pertinent and complex questions about media and privacy in a style that is both authoritative and easy to read... His book will prove an excellent companion for all students of this fascinating and crucial topic.' - Mireille Hildebrandt, Vrije Universiteit Brussel 'Clearly and accessibly written, this book is a great resource for anyone interested in the broad range of ways in which privacy and contemporary media are entangled and in the big picture of privacy/media relations today... I will definitely be assigning it for my students.' - Helen Kennedy, University of Sheffield

Modern Socio-Technical Perspectives on Privacy (Paperback, 1st ed. 2022): Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski,... Modern Socio-Technical Perspectives on Privacy (Paperback, 1st ed. 2022)
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, …
R1,022 Discovery Miles 10 220 Ships in 9 - 15 working days

This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.

Big Data Privacy and Security in Smart Cities (Hardcover, 1st ed. 2022): Richard Jiang, Ahmed Bouridane, Chang-Tsun Li, Danny... Big Data Privacy and Security in Smart Cities (Hardcover, 1st ed. 2022)
Richard Jiang, Ahmed Bouridane, Chang-Tsun Li, Danny Crookes, Said Boussakta, …
R2,553 Discovery Miles 25 530 Ships in 12 - 17 working days

This book highlights recent advances in smart cities technologies, with a focus on new technologies such as biometrics, blockchains, data encryption, data mining, machine learning, deep learning, cloud security, and mobile security. During the past five years, digital cities have been emerging as a technology reality that will come to dominate the usual life of people, in either developed or developing countries. Particularly, with big data issues from smart cities, privacy and security have been a widely concerned matter due to its relevance and sensitivity extensively present in cybersecurity, healthcare, medical service, e-commercial, e-governance, mobile banking, e-finance, digital twins, and so on. These new topics rises up with the era of smart cities and mostly associate with public sectors, which are vital to the modern life of people. This volume summarizes the recent advances in addressing the challenges on big data privacy and security in smart cities and points out the future research direction around this new challenging topic.

Delete - The Virtue of Forgetting in the Digital Age (Paperback, Revised edition): Viktor Mayer-Schoenberger Delete - The Virtue of Forgetting in the Digital Age (Paperback, Revised edition)
Viktor Mayer-Schoenberger
R513 R466 Discovery Miles 4 660 Save R47 (9%) Ships in 12 - 17 working days

"Delete" looks at the surprising phenomenon of perfect remembering in the digital age, and reveals why we must reintroduce our capacity to forget. Digital technology empowers us as never before, yet it has unforeseen consequences as well. Potentially humiliating content on Facebook is enshrined in cyberspace for future employers to see. Google remembers everything we've searched for and when. The digital realm remembers what is sometimes better forgotten, and this has profound implications for us all.

In "Delete," Viktor Mayer-Schonberger traces the important role that forgetting has played throughout human history, from the ability to make sound decisions unencumbered by the past to the possibility of second chances. The written word made it possible for humans to remember across generations and time, yet now digital technology and global networks are overriding our natural ability to forget--the past is ever present, ready to be called up at the click of a mouse. Mayer-Schonberger examines the technology that's facilitating the end of forgetting--digitization, cheap storage and easy retrieval, global access, and increasingly powerful software--and describes the dangers of everlasting digital memory, whether it's outdated information taken out of context or compromising photos the Web won't let us forget. He explains why information privacy rights and other fixes can't help us, and proposes an ingeniously simple solution--expiration dates on information--that may.

"Delete" is an eye-opening book that will help us remember how to forget in the digital age."

Secure Communications - Applications and Management (Hardcover): R.J. Sutton Secure Communications - Applications and Management (Hardcover)
R.J. Sutton
R3,666 Discovery Miles 36 660 Ships in 12 - 17 working days

If you need to know more about communication's security management, this is the perfect book for you………

Secure Communications confronts the practicalities of implementing the ideals of the security policy makers. Based on 15 years experience, the author addresses the key problems faced by security managers, starting from network conception, initial setting up and the maintenance of network security by key management. Many different types of communications networks are discussed using a wide range of topics, including voice, telephone, mobile phone, radio, fax, data transmission and storage, IP, and Email technologies. Each topic is portrayed in a number of different operational environments.

  • Explains the practical links between cryptography and telecommunications

  • Addresses the pertinent issues of implementation of cryptography as a method of protecting information

  • Supports each communications technology and the fundamentals of cryptography with useful and relevant telecommunications material

  • Provides practical solutions by network modelling and stimulating the reader's imagination on how to deal with their own network protection

  • Highlights the need for a structured infrastructure in an organisation's security that complements the technical solutions
Easy to read and highly illustrated, this timely publication probes the sensitive issues that manufacturers and agencies prefer to avoid and uses eye opening, historical events, to highlight the failings and weaknesses of the past and present. So if you work within the areas of telecommunications and security or are a researcher or student eager to know more, read on……….
Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New): Laurel Jennings, Richard M. Eastman Wiretaps & Electronic Eavesdropping - Federal Law & Legal Ethics (Hardcover, New)
Laurel Jennings, Richard M. Eastman
R3,051 R2,770 Discovery Miles 27 700 Save R281 (9%) Ships in 12 - 17 working days

It is a federal crime to wiretap or to use a machine to capture the communications of others without court approval, unless one of the parties has given his prior consent. It is likewise a federal crime to use or disclose any information acquired by illegal wiretapping or electronic eavesdropping. Violations can result in imprisonment for not more than five years; fines up to $250,000; in civil liability for damages, attorney's fees and possibly punitive damages; in disciplinary action against any attorneys involved; and in suppression of any derivative evidence. This book provides an overview of federal law governing wiretapping and electronic eavesdropping under the Electronic Communications Privacy Act (ECPA).

Data in Society - Challenging Statistics in an Age of Globalisation (Paperback): Jim Ridgway, Ron Johnston, Liliana Bounegru,... Data in Society - Challenging Statistics in an Age of Globalisation (Paperback)
Jim Ridgway, Ron Johnston, Liliana Bounegru, Jonathan Gray, Amy Sippitt, …
R913 Discovery Miles 9 130 Ships in 12 - 17 working days

Statistical data and evidence-based claims are increasingly central to our everyday lives. Critically examining 'Big Data', this book charts the recent explosion in sources of data, including those precipitated by global developments and technological change. It sets out changes and controversies related to data harvesting and construction, dissemination and data analytics by a range of private, governmental and social organisations in multiple settings. Analysing the power of data to shape political debate, the presentation of ideas to us by the media, and issues surrounding data ownership and access, the authors suggest how data can be used to uncover injustices and to advance social progress.

Data in Society - Challenging Statistics in an Age of Globalisation (Hardcover): Jim Ridgway, Ron Johnston, Liliana Bounegru,... Data in Society - Challenging Statistics in an Age of Globalisation (Hardcover)
Jim Ridgway, Ron Johnston, Liliana Bounegru, Jonathan Gray, Amy Sippitt, …
R2,525 Discovery Miles 25 250 Ships in 12 - 17 working days

Statistical data and evidence-based claims are increasingly central to our everyday lives. Critically examining 'Big Data', this book charts the recent explosion in sources of data, including those precipitated by global developments and technological change. It sets out changes and controversies related to data harvesting and construction, dissemination and data analytics by a range of private, governmental and social organisations in multiple settings. Analysing the power of data to shape political debate, the presentation of ideas to us by the media, and issues surrounding data ownership and access, the authors suggest how data can be used to uncover injustices and to advance social progress.

Cybersecurity Awareness Among Students and Faculty (Hardcover): Abbas Moallem Cybersecurity Awareness Among Students and Faculty (Hardcover)
Abbas Moallem
R1,638 Discovery Miles 16 380 Ships in 12 - 17 working days

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Modern Socio-Technical Perspectives on Privacy (Hardcover, 1st ed. 2022): Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski,... Modern Socio-Technical Perspectives on Privacy (Hardcover, 1st ed. 2022)
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, …
R1,353 Discovery Miles 13 530 Ships in 12 - 17 working days

This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.

Password Book With Alphabetical Tabs - Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password... Password Book With Alphabetical Tabs - Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password Logbook Password Journal (Paperback)
Iris Lorry Harrlez
R269 R223 Discovery Miles 2 230 Save R46 (17%) Ships in 10 - 15 working days
How to Destroy Surveillance Capitalism (Paperback): Cory Doctorow How to Destroy Surveillance Capitalism (Paperback)
Cory Doctorow
R332 R273 Discovery Miles 2 730 Save R59 (18%) Ships in 10 - 15 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - White Cover: Keep your usernames, passwords, social info, web addresses and... Password Keeper - Size (6 x 9 inches) - 100 Pages - White Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R173 Discovery Miles 1 730 Ships in 10 - 15 working days
Secrets and Lies - Digital Security in a Networked World (Paperback, New ed.): Bruce Schneier Secrets and Lies - Digital Security in a Networked World (Paperback, New ed.)
Bruce Schneier
R456 Discovery Miles 4 560 Ships in 12 - 17 working days

" A primer in practical computer security aimed at those shopping, communicating, or doing business online – almost everyone, in other words."
– The Economist

Viruses. Identity theft. Corporate espionage. National secrets compromised. Can anyone promise security in our digital world?

The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.

" This book is of value to anyone whose business depends on safe use of e-mail, the Web, or other networked communications. If that’ s not yet everybody, it soon will be."
– Stephen H. Wildstrom, BusinessWeek

" It’ s not often that a truly outstanding book is written for both technical users and management. Fortunately, Secrets and Lie pulls off this feat rather well."
– Dustin Puryear, Linux.com

" Schneier . . . peppers the book with lively anecdotes and aphorisms, making it unusually accessible."
– Los Angeles Times

Federal Cloud Computing - The Definitive Guide for Cloud Service Providers (Paperback, 2nd edition): Matthew Metheny Federal Cloud Computing - The Definitive Guide for Cloud Service Providers (Paperback, 2nd edition)
Matthew Metheny
R1,578 Discovery Miles 15 780 Ships in 12 - 17 working days

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.

Federal Cybersecurity - Identification & Mitigation Efforts of Sector-Specific Agencies (Paperback): Jeffery H. Matthews Federal Cybersecurity - Identification & Mitigation Efforts of Sector-Specific Agencies (Paperback)
Jeffery H. Matthews
R1,896 Discovery Miles 18 960 Ships in 12 - 17 working days

U. S. critical infrastructures, such as financial institutions, commercial buildings, and energy production and transmission facilities, are systems and assets, whether physical or virtual, vital to the nations security, economy, and public health and safety. To secure these systems and assets, federal policy and the National Infrastructure Protection Plan (NIPP) establish responsibilities for federal agencies designated as Sector-specific agencies (SSAs), including leading, facilitating, or supporting the security and resilience programs and associated activities of their designated critical infrastructure sectors. The objectives of this book are to determine the extent to which SSAs have identified the significance of cyber risks to their respective sectors networks and industrial control systems; taken actions to mitigate cyber risks within their respective sectors; collaborated across sectors to improve cybersecurity; and established performance metrics to monitor improvements in their respective sectors.

Privacy in Context - Technology, Policy, and the Integrity of Social Life (Paperback): Helen Nissenbaum Privacy in Context - Technology, Policy, and the Integrity of Social Life (Paperback)
Helen Nissenbaum
R685 Discovery Miles 6 850 Ships in 12 - 17 working days

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself--most people understand that this is crucial to social life --but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts--whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Building a Practical Information Security Program (Paperback): Jason Andress, Mark Leary Building a Practical Information Security Program (Paperback)
Jason Andress, Mark Leary
R1,656 R1,406 Discovery Miles 14 060 Save R250 (15%) Ships in 12 - 17 working days

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition)
Jason Andress, Ryan Linn
R1,058 Discovery Miles 10 580 Ships in 12 - 17 working days

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R766 Discovery Miles 7 660 Ships in 12 - 17 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

I'll Never Forget You - Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral... I'll Never Forget You - Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral Motif (Paperback)
Sam Secure
R172 Discovery Miles 1 720 Ships in 10 - 15 working days
Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback):... Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback)
Elijah Lewis
R517 Discovery Miles 5 170 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,222 Discovery Miles 22 220
Cybersecurity for Coaches and Therapists…
Alexandra Fouracres Paperback R1,011 Discovery Miles 10 110
The Little Black Book of Data and…
Kyle Taylor Paperback R271 Discovery Miles 2 710
The Data Bank Society (Routledge…
Malcolm Warner, Mike Stone Paperback R587 Discovery Miles 5 870
Software Security - Concepts & Practices
Suhel Ahmad Khan, Rajeev Kumar, … Hardcover R3,570 Discovery Miles 35 700
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,995 Discovery Miles 29 950
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Password Logbook (Black & Gold) - Keep…
Editors of Rock Point Hardcover R158 Discovery Miles 1 580
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,381 Discovery Miles 63 810
CISA - Certified Information Systems…
Hemang Doshi Paperback R2,040 Discovery Miles 20 400

 

Partners