0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (199)
  • R500+ (858)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Cybersecurity for Beginners - Basic Security Threats Everyone Should Know (Paperback): Kelly Fenathra Cybersecurity for Beginners - Basic Security Threats Everyone Should Know (Paperback)
Kelly Fenathra
R267 Discovery Miles 2 670 Ships in 10 - 15 working days
The Truth about Social Media (Paperback): Priyanka Gulshan The Truth about Social Media (Paperback)
Priyanka Gulshan
R203 Discovery Miles 2 030 Ships in 10 - 15 working days
The Face of Online Security and Tips to Help Protect You and Your Family - A guide for protecting the ones you love.... The Face of Online Security and Tips to Help Protect You and Your Family - A guide for protecting the ones you love. (Paperback)
Katrina R Garcia
R215 Discovery Miles 2 150 Ships in 10 - 15 working days
Password Book With Alphabetical Tabs - Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password... Password Book With Alphabetical Tabs - Email Address Book with Tabs Alphabetical Password Book Organizer Internet Password Logbook Password Journal (Paperback)
Iris Lorry Harrlez
R276 R229 Discovery Miles 2 290 Save R47 (17%) Ships in 10 - 15 working days
The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience... The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) (Hardcover)
Alan Calder
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

The Ransomware Threat Landscape - Prepare For, Recognise and Survive Ransomware Attacks (Paperback): IT Governance The Ransomware Threat Landscape - Prepare For, Recognise and Survive Ransomware Attacks (Paperback)
IT Governance
R645 Discovery Miles 6 450 Ships in 10 - 15 working days

The fastest-growing malware in the world The core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network. Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, which rose to $5 billion by 2017 and is set to hit $20 billion in 2021. The threat of ransomware is not going to disappear, and while the number of ransomware attacks remains steady, the damage they cause is significantly increasing. It is the duty of all business leaders to protect their organisations and the data they rely on by doing whatever is reasonably possible to mitigate the risk posed by ransomware. To do that, though, they first need to understand the threats they are facing. The Ransomware Threat Landscape This book sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation. These measures are structured so that any organisation can approach them. Those with more resources and more complex environments can build them into a comprehensive system to minimise risks, while smaller organisations can secure their profiles with simpler, more straightforward implementation. Suitable for senior directors, compliance managers, privacy managers, privacy officers, IT staff, security analysts and admin staff - in fact, all staff who use their organisation's network/online systems to perform their role - The Ransomware Threat Landscape - Prepare for, recognise and survive ransomware attacks will help readers understand the ransomware threat they face. From basic cyber hygiene to more advanced controls, the book gives practical guidance on individual activities, introduces implementation steps organisations can take to increase their cyber resilience, and explores why cyber security is imperative. Topics covered include: Introduction About ransomware Basic measures An anti-ransomware The control framework Risk management Controls Maturity Basic controls Additional controls for larger organisations Advanced controls Don't delay - start protecting your organisation from ransomware and buy this book today!

Happy 67th Birthday - 67 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a... Happy 67th Birthday - 67 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R294 Discovery Miles 2 940 Ships in 10 - 15 working days
Senior Cyber - Best Security Practices for Your Golden Years (Paperback): Scott N Schober, Craig W Schober Senior Cyber - Best Security Practices for Your Golden Years (Paperback)
Scott N Schober, Craig W Schober
R538 R447 Discovery Miles 4 470 Save R91 (17%) Ships in 10 - 15 working days
Happy 60th Birthday - 60 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a... Happy 60th Birthday - 60 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R294 Discovery Miles 2 940 Ships in 10 - 15 working days
Security, Privacy and User Interaction (Hardcover, 1st ed. 2020): Markus Jakobsson Security, Privacy and User Interaction (Hardcover, 1st ed. 2020)
Markus Jakobsson
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.

Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough... Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough reveal of its solution (Hardcover)
Frederic Scott Deaver
R2,839 R2,220 Discovery Miles 22 200 Save R619 (22%) Ships in 10 - 15 working days
Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback): Richard... Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback)
Richard Dorsel
R566 Discovery Miles 5 660 Ships in 10 - 15 working days
My Personal's Helper, Where's My Password - Password Log Password Reminder Collect Password Into the Same Book... My Personal's Helper, Where's My Password - Password Log Password Reminder Collect Password Into the Same Book (Paperback)
Jo Bora
R154 Discovery Miles 1 540 Ships in 10 - 15 working days
Technology-Augmented Perception and Cognition (Hardcover, 1st ed. 2021): Tilman Dingler, Evangelos Niforatos Technology-Augmented Perception and Cognition (Hardcover, 1st ed. 2021)
Tilman Dingler, Evangelos Niforatos
R4,519 Discovery Miles 45 190 Ships in 10 - 15 working days

Tools and technologies have long complemented and extended our physical abilities: from pre-historic spearheads to steam-propelled ploughs and high-tech prosthetics. While the development of lenses granted us insights into the micro and macrocosms, new sensors and technologies increasingly augment our cognitive abilities, including memory and perception. This book integrates current research efforts, results, and visions from the fields of computer science, neuroscience, and psychology. It provides a comprehensive overview of the state-of-the-art and future applications of how technologies assist and augment human perception and cognition. Experts in the field share their research and findings on: Working memory enhancements Digitization of memories through lifelog archives The consequences of technology-induced disruptions and forgetting The creation and utilization of new human senses Ethical and security concerns that arise with augmentation technologies. As technology weaves itself ever deeper into our lives, careful examination of its capabilities, risks and benefits is warranted. While this book focuses on the complementation and augmentation of human capabilities, it serves as a foundation for students, researchers and designers of technologies that push the boundaries of perception and cognition.

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021)
Wei Chang, Jie Wu
R3,734 Discovery Miles 37 340 Ships in 12 - 17 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Senior Cyber - Best Security Practices for Your Golden Years (Hardcover): Scott N Schober Senior Cyber - Best Security Practices for Your Golden Years (Hardcover)
Scott N Schober; As told to Craig W Schober
R807 R669 Discovery Miles 6 690 Save R138 (17%) Ships in 10 - 15 working days
How to Destroy Surveillance Capitalism (Paperback): Cory Doctorow How to Destroy Surveillance Capitalism (Paperback)
Cory Doctorow
R340 R280 Discovery Miles 2 800 Save R60 (18%) Ships in 10 - 15 working days
Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R11,598 Discovery Miles 115 980 Ships in 10 - 15 working days
Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R11,600 Discovery Miles 116 000 Ships in 10 - 15 working days
The Ethics of Cybersecurity (Paperback, 1st ed. 2020): Markus Christen, Bert Gordijn, Michele Loi The Ethics of Cybersecurity (Paperback, 1st ed. 2020)
Markus Christen, Bert Gordijn, Michele Loi
R2,737 Discovery Miles 27 370 Ships in 10 - 15 working days

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

New Dimensions of Information Warfare (Hardcover, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Hardcover, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,764 Discovery Miles 47 640 Ships in 10 - 15 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

Password Logbook - With Easy Find Tabs (Paperback): Bob Clark Password Logbook - With Easy Find Tabs (Paperback)
Bob Clark
R254 Discovery Miles 2 540 Ships in 10 - 15 working days
Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R609 R510 Discovery Miles 5 100 Save R99 (16%) Ships in 10 - 15 working days
Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and... Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation (Paperback)
Derek Drake, Instafo
R257 Discovery Miles 2 570 Ships in 10 - 15 working days
Algorithms for Data and Computation Privacy (Hardcover, 1st ed. 2021): Alex X. Liu, Rui Li Algorithms for Data and Computation Privacy (Hardcover, 1st ed. 2021)
Alex X. Liu, Rui Li
R4,303 Discovery Miles 43 030 Ships in 10 - 15 working days

This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,053 Discovery Miles 30 530
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540
Software Security - Concepts & Practices
Suhel Ahmad Khan, Rajeev Kumar, … Hardcover R3,640 Discovery Miles 36 400
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110
What To Do When You Get Hacked - A…
Shimon Brathwaite Hardcover R2,077 Discovery Miles 20 770
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,507 Discovery Miles 65 070
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410

 

Partners