0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (201)
  • R500+ (858)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Red And White Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Red And White Cover (Paperback)
Norman M Pray
R174 Discovery Miles 1 740 Ships in 10 - 15 working days
Cybersecurity Primer (Paperback): Victor M. Font Jr Cybersecurity Primer (Paperback)
Victor M. Font Jr
R498 R403 Discovery Miles 4 030 Save R95 (19%) Ships in 10 - 15 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and... Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R177 Discovery Miles 1 770 Ships in 10 - 15 working days
Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover)
Alex Wagner
R1,064 R860 Discovery Miles 8 600 Save R204 (19%) Ships in 10 - 15 working days
Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R522 R429 Discovery Miles 4 290 Save R93 (18%) Ships in 10 - 15 working days
Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover): Stepan Mykolayovych Bilan,... Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover)
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi
R10,511 Discovery Miles 105 110 Ships in 10 - 15 working days

Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

WTF Is My Password - Internet Password Logbook- Black (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Black (Paperback)
River Valley Journals
R168 Discovery Miles 1 680 Ships in 10 - 15 working days
Protect Your Online Identity Like Your Virginity (Paperback): Abhishek Singh Rajpurohit Protect Your Online Identity Like Your Virginity (Paperback)
Abhishek Singh Rajpurohit
R431 Discovery Miles 4 310 Ships in 10 - 15 working days
Improving your Penetration Testing Skills - Strengthen your defense against web attacks with Kali Linux and Metasploit... Improving your Penetration Testing Skills - Strengthen your defense against web attacks with Kali Linux and Metasploit (Paperback)
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features Gain insights into the latest antivirus evasion techniques Set up a complete pentesting environment using Metasploit and virtual machines Discover a variety of tools and techniques that can be used with Kali Linux Book DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. This Learning Path includes content from the following Packt products: Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al What you will learn Build and analyze Metasploit modules in Ruby Integrate Metasploit with other penetration testing tools Use server-side attacks to detect vulnerabilities in web servers and their applications Explore automated attacks such as fuzzing web applications Identify the difference between hacking a web application and network hacking Deploy Metasploit with the Penetration Testing Execution Standard (PTES) Use MSFvenom to generate payloads and backdoor files, and create shellcode Who this book is forThis Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.

Internet Password Organizer - Golden Retriever Dog (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Golden Retriever Dog (Password Log Book) (Paperback)
Peter Paker P K
R216 Discovery Miles 2 160 Ships in 10 - 15 working days
Ethical Hacking - Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking (Paperback): Brian... Ethical Hacking - Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking (Paperback)
Brian Walker
R514 Discovery Miles 5 140 Ships in 10 - 15 working days
Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server (Paperback): Hidaia Mahmooa Alassouli Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server (Paperback)
Hidaia Mahmooa Alassouli
R418 Discovery Miles 4 180 Ships in 10 - 15 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Black And White Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Black And White Cover (Paperback)
Norman M Pray
R174 Discovery Miles 1 740 Ships in 10 - 15 working days
I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design... I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design (Paperback)
Secure Publishing
R176 Discovery Miles 1 760 Ships in 10 - 15 working days
Control Shift - How Technology Affects You and Your Rights (Paperback): David Meyer Control Shift - How Technology Affects You and Your Rights (Paperback)
David Meyer
R323 Discovery Miles 3 230 Ships in 10 - 15 working days
Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020): Shiho Kim, Ganesh Chandra Deka Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020)
Shiho Kim, Ganesh Chandra Deka
R5,280 Discovery Miles 52 800 Ships in 10 - 15 working days

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R818 R680 Discovery Miles 6 800 Save R138 (17%) Ships in 10 - 15 working days
Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback)
Alex Wagner
R793 R655 Discovery Miles 6 550 Save R138 (17%) Ships in 10 - 15 working days
Keeping Track of - Passwords (Paperback): Susan Alison Keeping Track of - Passwords (Paperback)
Susan Alison
R202 Discovery Miles 2 020 Ships in 10 - 15 working days
Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R177 Discovery Miles 1 770 Ships in 10 - 15 working days
Building an Effective Cybersecurity Program (Paperback, 2nd ed.): Tari Schreider Building an Effective Cybersecurity Program (Paperback, 2nd ed.)
Tari Schreider
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - navy blue Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - navy blue Cover (Paperback)
Norman M Pray
R174 Discovery Miles 1 740 Ships in 10 - 15 working days
e-Citizens - Toward a New Model of (Inter)active Citizenry (Hardcover, 1st ed. 2019): Alfredo M. Ronchi e-Citizens - Toward a New Model of (Inter)active Citizenry (Hardcover, 1st ed. 2019)
Alfredo M. Ronchi
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This book explores a society currently being transformed by the influence of advanced information technology, and provides insights into the main technological and human issues and a holistic approach to inclusion, security, safety and, last but not least, privacy and freedom of expression. Its main aim is to bridge the gap between technological solutions, their successful implementation, and the fruitful utilization of the main set of e-Services offered by governments, private institutions, and commercial companies. Today, various parameters actively influence e-Services' success or failure: cultural aspects, organisational issues, bureaucracy and workflow, infrastructure and technology in general, user habits, literacy, capacity or merely interaction design. The purpose of this book is to help in outlining and understanding a realistic scenario of what we can term e-Citizenry. It identifies today's citizen, who is surrounded by an abundance of digital services, as an "e-Citizen" and explores the transition from their traditional role and behaviour to new ones. The respective chapters presented here will lay the foundation of the technological and social environment in which this societal transition takes place. With its balanced humanistic and technological approach, the book mainly targets public authorities, decision-makers, stakeholders, solution developers, and graduate students.

Security and Privacy Management, Techniques, and Protocols (Hardcover): Yassine Maleh Security and Privacy Management, Techniques, and Protocols (Hardcover)
Yassine Maleh
R5,739 Discovery Miles 57 390 Ships in 10 - 15 working days

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Cyber Security - Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (Paperback): Brian... Cyber Security - Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (Paperback)
Brian Walker
R516 Discovery Miles 5 160 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
Botnets - Architectures…
Georgios Kambourakis, Marios Anagnostopoulos, … Paperback R1,438 Discovery Miles 14 380
Cybersecurity For Dummies, 2nd Edition
J. Steinberg Paperback R795 R572 Discovery Miles 5 720
The Data Bank Society (Routledge…
Malcolm Warner, Mike Stone Paperback R599 Discovery Miles 5 990

 

Partners