0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (176)
  • R250 - R500 (203)
  • R500+ (846)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

What Every Engineer Should Know About Cyber Security and Digital Forensics (Hardcover, 2nd edition): Joanna F Defranco, Bob... What Every Engineer Should Know About Cyber Security and Digital Forensics (Hardcover, 2nd edition)
Joanna F Defranco, Bob Maley
R3,473 Discovery Miles 34 730 Ships in 12 - 17 working days

Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Hardcover, 5th edition)
Branden Williams, James Adamson
R3,053 Discovery Miles 30 530 Ships in 12 - 17 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

How to Find a Needle in a Haystack - From the Insider Threat to Solo Perpetrators (Hardcover): Yair Neuman How to Find a Needle in a Haystack - From the Insider Threat to Solo Perpetrators (Hardcover)
Yair Neuman
R1,517 Discovery Miles 15 170 Ships in 12 - 17 working days

By the end of this book, the reader will understand: the difficulties of finding a needle in a haystack; creative solutions to address the problem; unique ways of engineering features and solving the problem of the lack of data (e.g. synthetic data). Additionally, the reader will be able to: avoid mistakes resulting from a lack of understanding; search for appropriate methods of feature engineering; locate the relevant technological solutions within the general context of decision-making.

Security in the Digital World (Paperback): IT Governance Security in the Digital World (Paperback)
IT Governance
R481 Discovery Miles 4 810 Ships in 12 - 17 working days
Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Paperback): Ulf Mattsson Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Paperback)
Ulf Mattsson
R1,253 Discovery Miles 12 530 Ships in 12 - 17 working days

Unique selling point: * Gain practical tools to solve complex data privacy and security subjects for different business use cases and types of data. Core audience: * Suited to anyone in a CISOs, CSOs, CPOs, CDOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. Place in the market: * Tackles the critical skills needed to succeed in the evolving landscape of regulations and data breaches.

Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Hardcover): Ulf Mattsson Controlling Privacy and the Use of Data Assets - Volume 1 - Who Owns the New Oil? (Hardcover)
Ulf Mattsson
R1,793 Discovery Miles 17 930 Ships in 12 - 17 working days

Unique selling point: * Gain practical tools to solve complex data privacy and security subjects for different business use cases and types of data. Core audience: * Suited to anyone in a CISOs, CSOs, CPOs, CDOs, CTOs, auditors, consultants, investors, and other people interested in data privacy and security. Place in the market: * Tackles the critical skills needed to succeed in the evolving landscape of regulations and data breaches.

The Gentrification of the Internet - How to Reclaim Our Digital Freedom (Hardcover): Jessa Lingel The Gentrification of the Internet - How to Reclaim Our Digital Freedom (Hardcover)
Jessa Lingel
R446 Discovery Miles 4 460 Ships in 12 - 17 working days

How we lost control of the internet-and how to win it back. The internet has become a battleground. Although it was unlikely to live up to the hype and hopes of the 1990s, only the most skeptical cynics could have predicted the World Wide Web as we know it today: commercial, isolating, and full of, even fueled by, bias. This was not inevitable. The Gentrification of the Internet argues that much like our cities, the internet has become gentrified, dominated by the interests of business and capital rather than the interests of the people who use it. Jessa Lingel uses the politics and debates of gentrification to diagnose the massive, systemic problems blighting our contemporary internet: erosions of privacy and individual ownership, small businesses wiped out by wealthy corporations, the ubiquitous paywall. But there are still steps we can take to reclaim the heady possibilities of the early internet. Lingel outlines actions that internet activists and everyday users can take to defend and secure more protections for the individual and to carve out more spaces of freedom for the people-not businesses-online.

Cybersecurity for Coaches and Therapists - A Practical Guide for Protecting Client Data (Hardcover): Alexandra Fouracres Cybersecurity for Coaches and Therapists - A Practical Guide for Protecting Client Data (Hardcover)
Alexandra Fouracres
R3,915 Discovery Miles 39 150 Ships in 12 - 17 working days

-a short handbook designed for practical use by business owners to ensure they act in a professional, ethical and informed way around cybersecurity -first resource of its kind for coaches and therapists

Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R1,553 Discovery Miles 15 530 Ships in 12 - 17 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

ICT and Data Sciences (Hardcover): Archana Singh, Vinod Kumar Shukla, Ashish Seth, Sai Sabitha ICT and Data Sciences (Hardcover)
Archana Singh, Vinod Kumar Shukla, Ashish Seth, Sai Sabitha
R4,503 Discovery Miles 45 030 Ships in 12 - 17 working days

This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems. ICT and Data Sciences brings together IoT and Machine Learning and provides the careful integration of both, along with many examples and case studies. It illustrates the merging of two technologies while presenting basic to high-level concepts covering different fields and domains such as the Hospitality and Tourism industry, Smart Clothing, Cyber Crime, Programming, Communications, Business Intelligence, all in the context of the Internet of Things. The book is written for researchers and practitioners, working in Information Communication Technology and Computer Science.

The Security Hippie (Hardcover): Barak Engel The Security Hippie (Hardcover)
Barak Engel
R3,179 Discovery Miles 31 790 Ships in 12 - 17 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Internet of Everything and Big Data - Major Challenges in Smart Cities (Hardcover): Salahddine Krit, Mohamed Elhoseny,... Internet of Everything and Big Data - Major Challenges in Smart Cities (Hardcover)
Salahddine Krit, Mohamed Elhoseny, Valentina Emilia Balas, Rachid Benlamri, Marius M. Balas
R4,493 Discovery Miles 44 930 Ships in 12 - 17 working days

Explains concepts of Internet of Everything problems, research challenge goals, and vision in smart cities Based on the most recent innovations, and covering the major challenges in smart cities, between IoT and Big Data Examines security issues and challenges related to data-intensive advances in IoT Addresses the total information science challenges in Internet of Everything enabled technologies Covers the exploring and creating IoT environment related self-adaptive systems

Privacy Engineering (Paperback): Nishant Bhajaria Privacy Engineering (Paperback)
Nishant Bhajaria
R1,258 Discovery Miles 12 580 Ships in 12 - 17 working days

PrivacyEngineering is a hands-on guide to building a modern and flexible privacy program for your organization. It helps map essential legal requirements into practical engineering techniques that you can implement right away. The book develops your strategic understanding of data governance and helps you navigate the tricky trade-offs between privacy and business needs. You'll learn to spot risks in your own data management systems and prepare to satisfy both internal and external privacy audits. There's no bureaucratic new processes or expensive new software necessary. You'll learn how to repurpose the data and security tools you already use to achieve your privacy goals. Preserving the privacy of your users is essential for any successful business. Well-designed processes and data governance ensure that privacy is built into your systems from the ground up, keeping your users safe and helping your organization maintain compliance with the law.

Digital Totalitarianism - Algorithms and Society (Hardcover): Michael Filimowicz Digital Totalitarianism - Algorithms and Society (Hardcover)
Michael Filimowicz
R1,525 Discovery Miles 15 250 Ships in 12 - 17 working days

Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia. Digital networks allow for a granularity and pervasiveness of surveillance by government and corporate entities. This creates power asymmetries where each citizen's daily 'data exhaust' can be used for manipulative and controlling ends by powerful institutional actors. This volume explores key erosions in our fundamental human values associated with free societies by covering government surveillance of library-based activities, cognitive enhancement debates, the increasing business orientation of art schools, and the proliferation of conspiracy theories in network media. Scholars and students from many backgrounds, as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to questions of totalitarian tendencies encompassing research from Communication, Rhetoric, Library Sciences, Art and New Media.

Democratic Frontiers - Algorithms and Society (Hardcover): Michael Filimowicz Democratic Frontiers - Algorithms and Society (Hardcover)
Michael Filimowicz
R1,582 Discovery Miles 15 820 Ships in 12 - 17 working days

Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type. Digital technologies develop at a much faster pace relative to our systems of governance which are supposed to embody democratic principles that are comparatively timeless, whether rooted in ancient Greek or Enlightenment ideas of freedom, autonomy and citizenship. Algorithms, computing millions of calculations per second, do not pause to reflect on their operations. Developments in the accumulation of vast private datasets that are used to train automated machine learning algorithms pose new challenges for upholding these values. Social media platforms, while the key driver of today's information disorder, also afford new opportunities for organized social activism. The US and China, presumably at opposite ends of an ideological spectrum, are the main exporters of AI technology to both free and totalitarian societies. These are some of the important topics covered by this volume that examines the democratic stakes for societies with the rapid expansion of these technologies. Scholars and students from many backgrounds as well as policy makers, journalists and the general reading public will find a multidisciplinary approach to issues of democratic values and governance encompassing research from Sociology, Digital Humanities, New Media, Psychology, Communication, International Relations and Economics. Chapter 3 of this book is available for free in PDF format as Open Access from the individual product page at www.routledge.com. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license

Systemic Bias - Algorithms and Society (Hardcover): Michael Filimowicz Systemic Bias - Algorithms and Society (Hardcover)
Michael Filimowicz
R1,586 Discovery Miles 15 860 Ships in 12 - 17 working days

Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics. The output of computational models is directly tied not only to their inputs but to the relationships and assumptions embedded in their model design, many of which are of a social and cultural, rather than physical and mathematical, nature. How do human biases make their way into these data models, and what new strategies have been proposed to overcome bias in computed products? Scholars and students from many backgrounds, as well as policy makers, journalists, and the general reading public will find a multidisciplinary approach to inquiry into algorithmic bias encompassing research from Communication, Art, and New Media.

Data Power - Radical Geographies of Control and Resistance (Hardcover): Jim E. Thatcher, Craig M. Dalton Data Power - Radical Geographies of Control and Resistance (Hardcover)
Jim E. Thatcher, Craig M. Dalton
R2,048 Discovery Miles 20 480 Ships in 12 - 17 working days

In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.

A Guide to Using the Anonymous Web in Libraries and Information Organizations - Enhancing Patron Privacy and Information Access... A Guide to Using the Anonymous Web in Libraries and Information Organizations - Enhancing Patron Privacy and Information Access (Hardcover)
Brady D. Lund, Matthew A. Beckstrom
R4,044 Discovery Miles 40 440 Ships in 12 - 17 working days

A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services. It will be particularly useful to those seeking to promote enhanced privacy for their patrons. The book begins by explaining, in simple terms, what the anonymous web is, how it works, and its benefits for users. Lund and Beckstrom also explain why they believe access to the anonymous web should be provided in library and information organizations around the world. They describe how to provide access, as well as educate library users on how to utilize the anonymous web and navigate any challenges that might arise during implementation. The authors also encourage the development of library policies that guide appropriate conduct and filter content, where appropriate, in order to deter illegal activity. A Guide to Using the Anonymous Web in Libraries and Information Organizations reminds us that libraries and other information providers have a duty to educate and support their communities, while also preserving privacy. Demonstrating that the anonymous web can help them to fulfil these obligations, this book will be essential reading for library and information professionals working around the world.

Cognitive Radio - Computing Techniques, Network Security, and Challenges (Hardcover): Budati Anil Kumar, Peter Ho Chiung Ching,... Cognitive Radio - Computing Techniques, Network Security, and Challenges (Hardcover)
Budati Anil Kumar, Peter Ho Chiung Ching, Shuichi Torii
R3,019 Discovery Miles 30 190 Ships in 12 - 17 working days

The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that is yet to be addressed. To address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CRs include ensuring secure device operations and data transmission with advanced computing techniques. Successful development of CR systems will involve attainment of the following key objectives: Increasing the rate and capacity of CR-based networks How the power is utilized in CR hardware devices with CMOS circuits How the framework is needed in complex networks Vedic multipliers on CR networks Spatial analysis and clustering methods for traffic management To transmit a large volume of data like video compression Swarm optimization algorithms Resource sharing in peer-to-peer networking This book gathers the latest research works focusing on the issues, challenges, and solutions in the field of Cognitive Radio Networks, with various techniques. The chapters in this book will give solutions to the problems that Industry 4.0 faces, and will be an essential resource for scholars in all areas of the field.

Legal Data and Information in Practice - How Data and the Law Interact (Hardcover): Sarah A. Sutherland Legal Data and Information in Practice - How Data and the Law Interact (Hardcover)
Sarah A. Sutherland
R4,068 Discovery Miles 40 680 Ships in 12 - 17 working days

Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups. Presenting a synthesis of information about legal data that will furnish readers with a thorough understanding of the topic, the book also explains why it is becoming crucial that data analysis be integrated into decision-making in the legal space. Legal organizations are looking at how to develop data-driven insights for a variety of purposes and it is, as Sutherland shows, vital that they have the necessary skills to facilitate this work. This book will assist in this endeavour by providing an international perspective on the issues affecting access to legal data and clearly describing methods of obtaining and evaluating it. Sutherland also incorporates advice about how to critically approach data analysis. Legal Data and Information in Practice will be essential reading for those in the law library community who are based in English-speaking countries with a common law tradition. The book will also be useful to those with a general interest in legal data, including students, academics engaged in the study of information science and law.

Advanced Cybersecurity Technologies (Hardcover): Ralph Moseley Advanced Cybersecurity Technologies (Hardcover)
Ralph Moseley
R3,906 Discovery Miles 39 060 Ships in 12 - 17 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

The GDPR Challenge - Privacy, Technology, and Compliance in an Age of Accelerating Change (Hardcover): Amie Taal The GDPR Challenge - Privacy, Technology, and Compliance in an Age of Accelerating Change (Hardcover)
Amie Taal
R2,525 Discovery Miles 25 250 Ships in 12 - 17 working days

A must have book on how GDPR is actively working in the privacy, compliance and technology space. Gain a clear understanding of GDPR requirements and recognise opportunities to reshape your data privacy compliance programs. Learn unique techniques to avoid GDPR non-compliance in the third and fourth industrial revolution era. A practical guide to providing great insights on data privacy challenges and compliance with invaluable practical approaches. Demonstrates data privacy legislation differences and similarities in multi-jurisdictions and how to man oeuvre the minefield of privacy successfully.

Smart Innovation of Web of Things (Paperback): Aarti Jain, Ruben Gonzalez Crespo, Manju Khari Smart Innovation of Web of Things (Paperback)
Aarti Jain, Ruben Gonzalez Crespo, Manju Khari
R3,758 Discovery Miles 37 580 Ships in 12 - 17 working days

The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.

Cyberspace, Data Analytics, and Policing (Hardcover): David Skillicorn Cyberspace, Data Analytics, and Policing (Hardcover)
David Skillicorn
R2,079 Discovery Miles 20 790 Ships in 12 - 17 working days

Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.

Human Dimensions of Cybersecurity (Paperback): Terry Bossomaier, Steven D'Alessandro, Roger Bradbury Human Dimensions of Cybersecurity (Paperback)
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury
R660 Discovery Miles 6 600 Ships in 12 - 17 working days

"In Human Dimensions of Cyber Security, Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury have produced a book that ... shows how it is indeed possible to achieve what we all need; a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity - what it is, why it matters, and how to do it." --Professor Paul Cornish, Visiting Professor, LSE IDEAS, London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states. This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and don'ts of cybersecurity. The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity for Coaches and Therapists…
Alexandra Fouracres Paperback R1,011 Discovery Miles 10 110
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,222 Discovery Miles 22 220
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,995 Discovery Miles 29 950
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,381 Discovery Miles 63 810
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R741 Discovery Miles 7 410
The Little Black Book of Data and…
Kyle Taylor Paperback R271 Discovery Miles 2 710
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
Software Security - Concepts & Practices
Suhel Ahmad Khan, Rajeev Kumar, … Hardcover R3,570 Discovery Miles 35 700
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280

 

Partners