0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (224)
  • R500+ (767)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The Age of AI - And Our Human Future (Paperback): Henry A. Kissinger, Eric Schmidt, Daniel Huttenlocher The Age of AI - And Our Human Future (Paperback)
Henry A. Kissinger, Eric Schmidt, Daniel Huttenlocher
R360 R321 Discovery Miles 3 210 Save R39 (11%) Ships in 5 - 10 working days

A Wall Street Journal Bestseller 'IT SHOULD BE READ BY ANYONE TRYING TO MAKE SENSE OF GEOPOLITICS TODAY' FINANCIAL TIMES Three of our most accomplished and deep thinkers come together to explore Artificial Intelligence (AI) and the way it is transforming human society - and what it means for us all. An AI learned to win chess by making moves human grand masters had never conceived. Another AI discovered a new antibiotic by analysing molecular properties human scientists did not understand. Now, AI-powered jets are defeating experienced human pilots in simulated dogfights. AI is coming online in searching, streaming, medicine, education, and many other fields and, in so doing, transforming how humans are experiencing reality. In The Age of AI, three leading thinkers have come together to consider how AI will change our relationships with knowledge, politics, and the societies in which we live. The Age of AI is an essential roadmap to our present and our future, an era unlike any that has come before.

Innovative Solutions for Access Control Management (Hardcover): Ahmad Kamran Malik, Adeel Anjum, Basit Raza Innovative Solutions for Access Control Management (Hardcover)
Ahmad Kamran Malik, Adeel Anjum, Basit Raza
R4,892 Discovery Miles 48 920 Ships in 18 - 22 working days

Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user's information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.

Vehicular Cyber Physical Systems - Adaptive Connectivity and Security (Hardcover, 1st ed. 2017): Danda B. Rawat, Chandra... Vehicular Cyber Physical Systems - Adaptive Connectivity and Security (Hardcover, 1st ed. 2017)
Danda B. Rawat, Chandra Bajracharya
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.

CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback): Ip... CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback)
Ip Specialist
R510 Discovery Miles 5 100 Ships in 10 - 15 working days
Legal Aspects of Ethnic Data Collection and Positive Action - The Roma Minority in Europe (Hardcover, 1st ed. 2019): Jozefien... Legal Aspects of Ethnic Data Collection and Positive Action - The Roma Minority in Europe (Hardcover, 1st ed. 2019)
Jozefien Van Caeneghem
R3,260 Discovery Miles 32 600 Ships in 18 - 22 working days

This book addresses the legal feasibility of ethnic data collection and positive action for equality and anti-discrimination purposes, and considers how they could be used to promote the Roma minority's inclusion in Europe. The book's central aim is to research how a societal problem can be improved upon from a legal perspective. The controversy surrounding ethnic data collection and positive action severely limits their use at the national level. Accordingly, legal and political concerns are analysed and addressed in order to demonstrate that it is possible to collect such data and to implement such measures while fully respecting international and European human rights norms, provided that certain conditions are met. Part I focuses on ethnic data collection and explores the key rules and principles that govern it, the ways in which this equality tool could be used, and how potential obstacles might be overcome. It also identifies and addresses the specific challenges that arise when collecting ethnic data on the Roma minority in Europe. In turn, Part II explores positive action and the broad range of measures covered by the concept, before analysing the applicable international and European framework. It reviews the benefits and challenges of implementing positive action for Roma, identifies best practices, and gives special consideration to inter-cultural mediation in the advancement of Roma inclusion. The book concludes with an overview of the main findings on both topics and by identifying three essential elements that must be in place, in addition to full respect for the applicable legal rules, in order to combat discrimination and achieve the inclusion of Roma in Europe by complementing existing anti-discrimination frameworks with the collection of ethnic data and the implementation of positive action schemes.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
Cyber Security Standards, Practices and Industrial Applications - Systems and Methodologies (Hardcover): Junaid Ahmed Zubairi,... Cyber Security Standards, Practices and Industrial Applications - Systems and Methodologies (Hardcover)
Junaid Ahmed Zubairi, Athar Mahboob
R4,934 Discovery Miles 49 340 Ships in 18 - 22 working days

Cyber security, encompassing both information and network security, is of utmost importance in today s information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).

The 2018 Yearbook of the Digital Ethics Lab (Hardcover, 1st ed. 2019): Carl OEhman, David Watson The 2018 Yearbook of the Digital Ethics Lab (Hardcover, 1st ed. 2019)
Carl OEhman, David Watson
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book explores a wide range of topics in digital ethics. It features 11 chapters that analyze the opportunities and the ethical challenges posed by digital innovation, delineate new approaches to solve them, and offer concrete guidance to harness the potential for good of digital technologies. The contributors are all members of the Digital Ethics Lab (the DELab), a research environment that draws on a wide range of academic traditions. The chapters highlight the inherently multidisciplinary nature of the subject, which cannot be separated from the epistemological foundations of the technologies themselves or the political implications of the requisite reforms. Coverage illustrates the importance of expert knowledge in the project of designing new reforms and political systems for the digital age. The contributions also show how this task requires a deep self-understanding of who we are as individuals and as a species. The questions raised here have ancient -- perhaps even timeless -- roots. The phenomena they address may be new. But, the contributors examine the fundamental concepts that undergird them: good and evil, justice and truth. Indeed, every epoch has its great challenges. The role of philosophy must be to redefine the meaning of these concepts in light of the particular challenges it faces. This is true also for the digital age. This book takes an important step towards redefining and re-implementing fundamental ethical concepts to this new era.

Convergent Media and Privacy (Hardcover, 1st ed. 2015): Tim Dwyer Convergent Media and Privacy (Hardcover, 1st ed. 2015)
Tim Dwyer
R3,231 Discovery Miles 32 310 Ships in 18 - 22 working days

A lot of personal data is being collected and stored as we use our media devices for business and pleasure in mobile and online spaces. This book helps us contemplate what a post-Facebook or post-Google world might look like, and how the tensions within capitalist information societies between corporations, government and citizens might play out.

Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback): Babak Akhgar, Andrew Staniforth, Francesca Bosco Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback)
Babak Akhgar, Andrew Staniforth, Francesca Bosco
R1,110 Discovery Miles 11 100 Ships in 10 - 15 working days

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.

Data Privacy in the Information Age (Hardcover): Jacqueline Klosek Data Privacy in the Information Age (Hardcover)
Jacqueline Klosek
R2,807 R2,541 Discovery Miles 25 410 Save R266 (9%) Ships in 10 - 15 working days

Passage of the European Data Protection Directive and other national laws have increased the need for companies and other entities to improve their data protection and privacy controls. Clients, stakeholders, and the public are clamoring for it. Klosek introduces the various legal means to protect personal data in the United States and the European Union, targeting her book at American and international businesses that may have difficulty complying with the European Directive. She explains its main elements and practical effects, presents primary components of national privacy laws abroad and in the United States, and gives advice on some steps companies can take to improve the level of protection they afford to the data they possess.

Klosek offers a comprehensive review of the American and European systems for providing protection to personal information in the Internet age. She explains the European Data Protection Directive, the national data protection laws of the fifteen countries of the European Union, and the laws and other initiatives for protecting individual personal data. She endeavors to discuss the protection of personal data in general but focuses on, and emphasizes, the protection of personal data within the context of the Internet. In doing so, she provides much useful, fascinating information on the obvious and non-obvious means of collecting and processing personal data through the Internet. Among its unusual features, the book helps United States corporate decision makers assess the effect data protection laws will have in Europe and the U.S., and how companies that are operating web sites that cross international boundaries can ensure they stay in compliance with data protection laws in countries in which their web sites may be accessible. The book is essential reading for corporate compliance executives, corporate communications and other top-level organizational administrators, particularly in Internet industries.

Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016): Rastko R. Selmic, Vir V Phoha, Abdul... Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016)
Rastko R. Selmic, Vir V Phoha, Abdul Serwadda
R2,522 Discovery Miles 25 220 Ships in 10 - 15 working days

This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.

Data Protection and Privacy, Volume 10 - The Age of Intelligent Machines (Hardcover): Ronald Leenes, Rosamunde van Brakel,... Data Protection and Privacy, Volume 10 - The Age of Intelligent Machines (Hardcover)
Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert
R2,377 Discovery Miles 23 770 Ships in 10 - 15 working days

The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018. This volume brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy and data protection. It is one of the results of the tenth annual International Conference on Computers, Privacy and Data Protection, CPDP 2017, held in Brussels in January 2017. The book explores Directive 95/46/EU and the GDPR moving from a market framing to a 'treaty-base games frame', the GDPR requirements regarding machine learning, the need for transparency in automated decision-making systems to warrant against wrong decisions and protect privacy, the riskrevolution in EU data protection law, data security challenges of Industry 4.0, (new) types of data introduced in the GDPR, privacy design implications of conversational agents, and reasonable expectations of data protection in Intelligent Orthoses. This interdisciplinary book was written while the implications of the General Data Protection Regulation 2016/679 were beginning to become clear. It discusses open issues, and daring and prospective approaches. It will serve as an insightful resource for readers with an interest in computers, privacy and data protection.

Multimedia Forensics and Security - Foundations, Innovations, and Applications (Hardcover, 1st ed. 2017): Aboul Ella Hassanien,... Multimedia Forensics and Security - Foundations, Innovations, and Applications (Hardcover, 1st ed. 2017)
Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, …
R4,070 R3,539 Discovery Miles 35 390 Save R531 (13%) Ships in 10 - 15 working days

This book presents recent applications and approaches as well as challenges in digital forensic science. One of the evolving challenges that is covered in the book is the cloud forensic analysis which applies the digital forensic science over the cloud computing paradigm for conducting either live or static investigations within the cloud environment. The book also covers the theme of multimedia forensics and watermarking in the area of information security. That includes highlights on intelligence techniques designed for detecting significant changes in image and video sequences. Moreover, the theme proposes recent robust and computationally efficient digital watermarking techniques. The last part of the book provides several digital forensics related applications, including areas such as evidence acquisition enhancement, evidence evaluation, cryptography, and finally, live investigation through the importance of reconstructing the botnet attack scenario to show the malicious activities and files as evidences to be presented in a court.

The World of Open Data - Concepts, Methods, Tools and Experiences (Hardcover, 1st ed. 2018): Yannis Charalabidis, Anneke... The World of Open Data - Concepts, Methods, Tools and Experiences (Hardcover, 1st ed. 2018)
Yannis Charalabidis, Anneke Zuiderwijk, Charalampos Alexopoulos, Marijn Janssen, Thomas Lampoltshammer, …
R3,991 Discovery Miles 39 910 Ships in 10 - 15 working days

This book discusses the latest developments in the field of open data. The opening of data by public organizations has the potential to improve the public sector, inspire business innovation, and establish transparency. With this potential comes unique challenges; these developments impact the operation of governments as well as their relationship with private sector enterprises and society. Changes at the technical, organizational, managerial, and political level are taking place, which, in turn, impact policy-making and traditional institutional structures. This book contributes to the systematic analysis and publication of cutting-edge methods, tools, and approaches for more efficient data sharing policies, practices, and further research. Topics discussed include an introduction to open data, the open data landscape, the open data life cycle, open data policies, organizational issues, interoperability, infrastructure, business models, open data portal evaluation, and research directions, best practices, and guidelines. Written to address different perspectives, this book will be of equal interest to students and researchers, ICT industry staff, practitioners, policy makers and public servants.

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R1,966 Discovery Miles 19 660 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R699 R628 Discovery Miles 6 280 Save R71 (10%) Ships in 18 - 22 working days
Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015): Sherali Zeadally,... Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015)
Sherali Zeadally, Mohamad Badra
R2,411 Discovery Miles 24 110 Ships in 10 - 15 working days

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.

Metrics and Methods for Security Risk Management (Paperback): Carl Young Metrics and Methods for Security Risk Management (Paperback)
Carl Young
R830 Discovery Miles 8 300 Ships in 10 - 15 working days

Not only are corporations and other organizations sometimes targeted by competitors in order to steal their information, they are also targets of political and/or religious groups who understand their economic and symbolic importance. However, a realistic security strategy requires a big-picture approach. At the same time, budgets are decreasing while security departments are dealing with threats that demand greater vigilance. In the wake of the 2008-2009 global economic meltdown, corporate executives are asking difficult questions about effectiveness and efficiency. The need for both information security and physical security is greater today than ever before, and not only to address more complex and dangerous crisis situations, but also to ensure that the methods deployed are proportionate to the risk.

The notion of risk is the lens from which all such problems must be viewed. This book identifies and explains these foundational principles, and shows how they directly relate to an assessment of physical security risk. This book provides the modern security professional with a useful reference that facilitates both rigorous thinking and sensible decisions about key strategic choices.

* Offers an integrated approach to assessing security risk * Addresses homeland security as well as IT and physical security issues * Describes vital safeguards for ensuring true business continuity

e-Citizens - Toward a New Model of (Inter)active Citizenry (Hardcover, 1st ed. 2019): Alfredo M. Ronchi e-Citizens - Toward a New Model of (Inter)active Citizenry (Hardcover, 1st ed. 2019)
Alfredo M. Ronchi
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days

This book explores a society currently being transformed by the influence of advanced information technology, and provides insights into the main technological and human issues and a holistic approach to inclusion, security, safety and, last but not least, privacy and freedom of expression. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services offered by governments, private institutions, and commercial companies. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflow, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. The purpose of this book is to help in outlining and understanding a realistic scenario of what we can term e-Citizenry. It identifies today's citizen, who is surrounded by an abundance of digital services, as an "e-Citizen" and explores the transition from their traditional role and behaviour to new ones. The respective chapters presented here will lay the foundation of the technological and social environment in which this societal transition takes place. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.

Industrial Espionage and Technical Surveillance Counter Measurers (Hardcover, 1st ed. 2016): I. I. Androulidakis, Fragkiskos -... Industrial Espionage and Technical Surveillance Counter Measurers (Hardcover, 1st ed. 2016)
I. I. Androulidakis, Fragkiskos - Emmanouil Kioupakis
R3,530 R2,584 Discovery Miles 25 840 Save R946 (27%) Ships in 10 - 15 working days

This book examines technical aspects of industrial espionage and its impact in modern companies, organizations, and individuals while emphasizing the importance of intellectual property in the information era. The authors discuss the problem itself and then provide statistics and real world cases. The main contribution provides a detailed discussion of the actual equipment, tools and techniques concerning technical surveillance in the framework of espionage. Moreover, they present the best practices and methods of detection (technical surveillance counter measures) as well as means of intellectual property protection.

Information Security Handbook (Hardcover): Conner Casini Information Security Handbook (Hardcover)
Conner Casini
R3,076 R2,788 Discovery Miles 27 880 Save R288 (9%) Ships in 18 - 22 working days
Scene of the Cybercrime (Paperback, 2nd edition): Debra Littlejohn Shinder, Michael Cross Scene of the Cybercrime (Paperback, 2nd edition)
Debra Littlejohn Shinder, Michael Cross
R1,343 Discovery Miles 13 430 Ships in 10 - 15 working days

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws.

* Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations.
* Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard
* Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones.

Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover): Richard G Lowe Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover)
Richard G Lowe
R956 R835 Discovery Miles 8 350 Save R121 (13%) Ships in 18 - 22 working days
Privacy, Intrusion Detection, and Response - Technologies for Protecting Networks (Hardcover, New): Peyman Kabiri Privacy, Intrusion Detection, and Response - Technologies for Protecting Networks (Hardcover, New)
Peyman Kabiri
R4,872 Discovery Miles 48 720 Ships in 18 - 22 working days

Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Latin American Sport Media - The Making…
Bernardo Buarque De Hollanda, Luiz Guilherme Burlamaqui Hardcover R3,658 Discovery Miles 36 580
Artificial Intelligence, Machine…
Shikha Jain, Kavita Pandey, … Paperback R2,958 Discovery Miles 29 580
Overkill
Sandra Brown Paperback R488 R460 Discovery Miles 4 600
Feynman Integrals - A Comprehensive…
Stefan Weinzierl Hardcover R1,639 Discovery Miles 16 390
The First Gentleman
Bill Clinton, James Patterson Paperback R395 R353 Discovery Miles 3 530
Advances in Cryptology - ASIACRYPT 2002…
Yuliang Zheng Paperback R1,655 Discovery Miles 16 550
Action Mounts Junior Chest Mount Gopro…
R528 R339 Discovery Miles 3 390
Designing Embedded Internet Devices
Brian DeMuth, Dan Eisenreich Paperback R1,530 Discovery Miles 15 300
Slik Quick Shoe 6256 Camera Mount for…
R353 Discovery Miles 3 530
The Online Informal Learning of English
G. Sockett Hardcover R3,640 Discovery Miles 36 400

 

Partners