0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (119)
  • R250 - R500 (220)
  • R500+ (777)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback): Ip... CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback)
Ip Specialist
R510 Discovery Miles 5 100 Ships in 10 - 15 working days
Vehicular Cyber Physical Systems - Adaptive Connectivity and Security (Hardcover, 1st ed. 2017): Danda B. Rawat, Chandra... Vehicular Cyber Physical Systems - Adaptive Connectivity and Security (Hardcover, 1st ed. 2017)
Danda B. Rawat, Chandra Bajracharya
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.

Personalized Privacy Protection in Big Data (Hardcover, 1st ed. 2021): Youyang Qu, Mohammad  Reza Nosouhi, Lei Cui, Shui Yu Personalized Privacy Protection in Big Data (Hardcover, 1st ed. 2021)
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
R1,738 Discovery Miles 17 380 Ships in 18 - 22 working days

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

Senior Cyber - Best Security Practices for Your Golden Years (Hardcover): Scott N Schober Senior Cyber - Best Security Practices for Your Golden Years (Hardcover)
Scott N Schober; As told to Craig W Schober
R689 R618 Discovery Miles 6 180 Save R71 (10%) Ships in 18 - 22 working days
Cyber Security Standards, Practices and Industrial Applications - Systems and Methodologies (Hardcover): Junaid Ahmed Zubairi,... Cyber Security Standards, Practices and Industrial Applications - Systems and Methodologies (Hardcover)
Junaid Ahmed Zubairi, Athar Mahboob
R4,934 Discovery Miles 49 340 Ships in 18 - 22 working days

Cyber security, encompassing both information and network security, is of utmost importance in today s information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).

You: For Sale - Protecting Your Personal Data and Privacy Online (Paperback): Stuart Sumner You: For Sale - Protecting Your Personal Data and Privacy Online (Paperback)
Stuart Sumner
R853 Discovery Miles 8 530 Ships in 10 - 15 working days

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people choose to share their details on social media, which are then sold to advertisers. The Edward Snowden revelations that governments - including those of the US and UK - have been snooping on their citizens, have rocked the world. But nobody seems to realize that this has already been happening for years, with firms such as Google capturing everything you type into a browser and selling it to the highest bidder. Apps take information about where you go, and your contact book details, harvest them and sell them on - and people just click the EULA without caring. No one is revealing the dirty secret that is the tech firms harvesting customers' personal data and selling it for vast profits - and people are totally unaware of the dangers. You: For Sale is for anyone who is concerned about what corporate and government invasion of privacy means now and down the road. The book sets the scene by spelling out exactly what most users of the Internet and smart phones are exposing themselves to via commonly used sites and apps such as facebook and Google, and then tells you what you can do to protect yourself. The book also covers legal and government issues as well as future trends. With interviews of leading security experts, black market data traders, law enforcement and privacy groups, You: For Sale will help you view your personal data in a new light, and understand both its value, and its danger.

The 2018 Yearbook of the Digital Ethics Lab (Hardcover, 1st ed. 2019): Carl OEhman, David Watson The 2018 Yearbook of the Digital Ethics Lab (Hardcover, 1st ed. 2019)
Carl OEhman, David Watson
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book explores a wide range of topics in digital ethics. It features 11 chapters that analyze the opportunities and the ethical challenges posed by digital innovation, delineate new approaches to solve them, and offer concrete guidance to harness the potential for good of digital technologies. The contributors are all members of the Digital Ethics Lab (the DELab), a research environment that draws on a wide range of academic traditions. The chapters highlight the inherently multidisciplinary nature of the subject, which cannot be separated from the epistemological foundations of the technologies themselves or the political implications of the requisite reforms. Coverage illustrates the importance of expert knowledge in the project of designing new reforms and political systems for the digital age. The contributions also show how this task requires a deep self-understanding of who we are as individuals and as a species. The questions raised here have ancient -- perhaps even timeless -- roots. The phenomena they address may be new. But, the contributors examine the fundamental concepts that undergird them: good and evil, justice and truth. Indeed, every epoch has its great challenges. The role of philosophy must be to redefine the meaning of these concepts in light of the particular challenges it faces. This is true also for the digital age. This book takes an important step towards redefining and re-implementing fundamental ethical concepts to this new era.

Convergent Media and Privacy (Hardcover, 1st ed. 2015): Tim Dwyer Convergent Media and Privacy (Hardcover, 1st ed. 2015)
Tim Dwyer
R3,231 Discovery Miles 32 310 Ships in 18 - 22 working days

A lot of personal data is being collected and stored as we use our media devices for business and pleasure in mobile and online spaces. This book helps us contemplate what a post-Facebook or post-Google world might look like, and how the tensions within capitalist information societies between corporations, government and citizens might play out.

Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback): Babak Akhgar, Andrew Staniforth, Francesca Bosco Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback)
Babak Akhgar, Andrew Staniforth, Francesca Bosco
R1,110 Discovery Miles 11 100 Ships in 10 - 15 working days

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R503 Discovery Miles 5 030 Ships in 18 - 22 working days
Data Privacy in the Information Age (Hardcover): Jacqueline Klosek Data Privacy in the Information Age (Hardcover)
Jacqueline Klosek
R2,807 R2,541 Discovery Miles 25 410 Save R266 (9%) Ships in 10 - 15 working days

Passage of the European Data Protection Directive and other national laws have increased the need for companies and other entities to improve their data protection and privacy controls. Clients, stakeholders, and the public are clamoring for it. Klosek introduces the various legal means to protect personal data in the United States and the European Union, targeting her book at American and international businesses that may have difficulty complying with the European Directive. She explains its main elements and practical effects, presents primary components of national privacy laws abroad and in the United States, and gives advice on some steps companies can take to improve the level of protection they afford to the data they possess.

Klosek offers a comprehensive review of the American and European systems for providing protection to personal information in the Internet age. She explains the European Data Protection Directive, the national data protection laws of the fifteen countries of the European Union, and the laws and other initiatives for protecting individual personal data. She endeavors to discuss the protection of personal data in general but focuses on, and emphasizes, the protection of personal data within the context of the Internet. In doing so, she provides much useful, fascinating information on the obvious and non-obvious means of collecting and processing personal data through the Internet. Among its unusual features, the book helps United States corporate decision makers assess the effect data protection laws will have in Europe and the U.S., and how companies that are operating web sites that cross international boundaries can ensure they stay in compliance with data protection laws in countries in which their web sites may be accessible. The book is essential reading for corporate compliance executives, corporate communications and other top-level organizational administrators, particularly in Internet industries.

Data Protection and Privacy, Volume 10 - The Age of Intelligent Machines (Hardcover): Ronald Leenes, Rosamunde van Brakel,... Data Protection and Privacy, Volume 10 - The Age of Intelligent Machines (Hardcover)
Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert
R2,377 Discovery Miles 23 770 Ships in 10 - 15 working days

The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the tenth annual International Conference on Computers, Privacy and Data Protection, CPDP 2017, held in Brussels in January 2017. The book explores Directive 95/46/EU and the GDPR moving from a market framing to a 'treaty-base games frame', the GDPR requirements regarding machine learning, the need for transparency in automated decision-making systems to warrant against wrong decisions and protect privacy, the riskrevolution in EU data protection law, data security challenges of Industry 4.0, (new) types of data introduced in the GDPR, privacy design implications of conversational agents, and reasonable expectations of data protection in Intelligent Orthoses. This interdisciplinary book was written while the implications of the General Data Protection Regulation 2016/679 were beginning to become clear. It discusses open issues, and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in computers, privacy and data protection.

The Little Black Book of Data and Democracy - From Innocent Tweeting to an Attempted Coup: How social media threatens our very... The Little Black Book of Data and Democracy - From Innocent Tweeting to an Attempted Coup: How social media threatens our very way of life (Paperback)
Kyle Taylor
R306 R284 Discovery Miles 2 840 Save R22 (7%) Ships in 10 - 15 working days
Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016): Rastko R. Selmic, Vir V Phoha, Abdul... Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016)
Rastko R. Selmic, Vir V Phoha, Abdul Serwadda
R2,522 Discovery Miles 25 220 Ships in 10 - 15 working days

This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.

Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015): Sherali Zeadally,... Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015)
Sherali Zeadally, Mohamad Badra
R2,411 Discovery Miles 24 110 Ships in 10 - 15 working days

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.

Multimedia Forensics and Security - Foundations, Innovations, and Applications (Hardcover, 1st ed. 2017): Aboul Ella Hassanien,... Multimedia Forensics and Security - Foundations, Innovations, and Applications (Hardcover, 1st ed. 2017)
Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, …
R4,070 R3,539 Discovery Miles 35 390 Save R531 (13%) Ships in 10 - 15 working days

This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R1,966 Discovery Miles 19 660 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R699 R628 Discovery Miles 6 280 Save R71 (10%) Ships in 18 - 22 working days
The World of Open Data - Concepts, Methods, Tools and Experiences (Hardcover, 1st ed. 2018): Yannis Charalabidis, Anneke... The World of Open Data - Concepts, Methods, Tools and Experiences (Hardcover, 1st ed. 2018)
Yannis Charalabidis, Anneke Zuiderwijk, Charalampos Alexopoulos, Marijn Janssen, Thomas Lampoltshammer, …
R3,991 Discovery Miles 39 910 Ships in 10 - 15 working days

This book discusses the latest developments in the field of open data. The opening of data by public organizations has the potential to improve the public sector, inspire business innovation, and establish transparency. With this potential comes unique challenges; these developments impact the operation of governments as well as their relationship with private sector enterprises and society. Changes at the technical, organizational, managerial, and political level are taking place, which, in turn, impact policy-making and traditional institutional structures. This book contributes to the systematic analysis and publication of cutting-edge methods, tools, and approaches for more efficient data sharing policies, practices, and further research. Topics discussed include an introduction to open data, the open data landscape, the open data life cycle, open data policies, organizational issues, interoperability, infrastructure, business models, open data portal evaluation, and research directions, best practices, and guidelines. Written to address different perspectives, this book will be of equal interest to students and researchers, ICT industry staff, practitioners, policy makers and public servants.

e-Citizens - Toward a New Model of (Inter)active Citizenry (Hardcover, 1st ed. 2019): Alfredo M. Ronchi e-Citizens - Toward a New Model of (Inter)active Citizenry (Hardcover, 1st ed. 2019)
Alfredo M. Ronchi
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days

This book explores a society currently being transformed by the influence of advanced information technology, and provides insights into the main technological and human issues and a holistic approach to inclusion, security, safety and, last but not least, privacy and freedom of expression. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services offered by governments, private institutions, and commercial companies. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflow, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. The purpose of this book is to help in outlining and understanding a realistic scenario of what we can term e-Citizenry. It identifies today's citizen, who is surrounded by an abundance of digital services, as an "e-Citizen" and explores the transition from their traditional role and behaviour to new ones. The respective chapters presented here will lay the foundation of the technological and social environment in which this societal transition takes place. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.

Industrial Espionage and Technical Surveillance Counter Measurers (Hardcover, 1st ed. 2016): I. I. Androulidakis, Fragkiskos -... Industrial Espionage and Technical Surveillance Counter Measurers (Hardcover, 1st ed. 2016)
I. I. Androulidakis, Fragkiskos - Emmanouil Kioupakis
R3,530 R2,584 Discovery Miles 25 840 Save R946 (27%) Ships in 10 - 15 working days

This book examines technical aspects of industrial espionage and its impact in modern companies, organizations, and individuals while emphasizing the importance of intellectual property in the information era. The authors discuss the problem itself and then provide statistics and real world cases. The main contribution provides a detailed discussion of the actual equipment, tools and techniques concerning technical surveillance in the framework of espionage. Moreover, they present the best practices and methods of detection (technical surveillance counter measures) as well as means of intellectual property protection.

Metrics and Methods for Security Risk Management (Paperback): Carl Young Metrics and Methods for Security Risk Management (Paperback)
Carl Young
R830 Discovery Miles 8 300 Ships in 10 - 15 working days

Not only are corporations and other organizations sometimes targeted by competitors in order to steal their information, they are also targets of political and/or religious groups who understand their economic and symbolic importance. However, a realistic security strategy requires a big-picture approach. At the same time, budgets are decreasing while security departments are dealing with threats that demand greater vigilance. In the wake of the 2008-2009 global economic meltdown, corporate executives are asking difficult questions about effectiveness and efficiency. The need for both information security and physical security is greater today than ever before, and not only to address more complex and dangerous crisis situations, but also to ensure that the methods deployed are proportionate to the risk.

The notion of risk is the lens from which all such problems must be viewed. This book identifies and explains these foundational principles, and shows how they directly relate to an assessment of physical security risk. This book provides the modern security professional with a useful reference that facilitates both rigorous thinking and sensible decisions about key strategic choices.

* Offers an integrated approach to assessing security risk * Addresses homeland security as well as IT and physical security issues * Describes vital safeguards for ensuring true business continuity

Information Security Handbook (Hardcover): Conner Casini Information Security Handbook (Hardcover)
Conner Casini
R3,076 R2,788 Discovery Miles 27 880 Save R288 (9%) Ships in 18 - 22 working days
Scene of the Cybercrime (Paperback, 2nd edition): Debra Littlejohn Shinder, Michael Cross Scene of the Cybercrime (Paperback, 2nd edition)
Debra Littlejohn Shinder, Michael Cross
R1,343 Discovery Miles 13 430 Ships in 10 - 15 working days

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws.

* Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations.
* Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard
* Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Building Regulations Pocket Book
Ray Tricker, Samantha Alford Paperback R935 Discovery Miles 9 350
Ichnographia Rustica; Or, the Nobleman…
Stephen Switzer Paperback R533 Discovery Miles 5 330
Make: Volume 69
Mike Sense Paperback R234 R171 Discovery Miles 1 710
Carpentry and Joinery 1
Brian Porter, Chris Tooke Paperback R315 Discovery Miles 3 150
Text-book of Modern Carpentry…
Thomas William Silloway Hardcover R836 Discovery Miles 8 360
Make Your Own Handcrafted Doors…
John Birchard Paperback R809 Discovery Miles 8 090
Shipping Container Homes - A Complete…
Peter Johnson Hardcover R549 R503 Discovery Miles 5 030
The City & Guilds Textbook: Carpentry…
Stephen Redfern, Stephen Jones Paperback R997 Discovery Miles 9 970
Carpentry and Joinery 1
Brian Porter, Chris Tooke Hardcover R5,639 Discovery Miles 56 390
Quality of Machined Wood Surfaces
Etele Csanady, Endre Magoss, … Hardcover R3,627 R3,367 Discovery Miles 33 670

 

Partners