0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (228)
  • R500+ (763)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised... Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers (Paperback, 2015 ed.)
Lu Yueming, Wu Xu, Zhang XI
R2,491 Discovery Miles 24 910 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.

Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R311 R288 Discovery Miles 2 880 Save R23 (7%) Ships in 18 - 22 working days
Database Security XII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 1999): Sushil Jajodia Database Security XII - Status and Prospects (Paperback, Softcover reprint of the original 1st ed. 1999)
Sushil Jajodia
R4,018 Discovery Miles 40 180 Ships in 18 - 22 working days

New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: * Electronic Commerce * Informational Assurances * Workflow * Privacy * Policy Modeling * Mediation * Information Warfare Defense * Multilevel Security * Role-based Access Controls * Mobile Databases * Inference * Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.

Information Risk Management - A practitioner's guide (Paperback, 2nd edition): David Sutton Information Risk Management - A practitioner's guide (Paperback, 2nd edition)
David Sutton
R1,278 Discovery Miles 12 780 Ships in 9 - 17 working days

Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline.

Ransomware Protection Playbook (Paperback): RA Grimes Ransomware Protection Playbook (Paperback)
RA Grimes
R625 R552 Discovery Miles 5 520 Save R73 (12%) Ships in 9 - 17 working days

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization's, data.

Hacking - A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made... Hacking - A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux (Paperback)
Kevin White
R466 Discovery Miles 4 660 Ships in 18 - 22 working days
Privacy in Context - Technology, Policy, and the Integrity of Social Life (Hardcover): Helen Nissenbaum Privacy in Context - Technology, Policy, and the Integrity of Social Life (Hardcover)
Helen Nissenbaum
R2,803 Discovery Miles 28 030 Ships in 18 - 22 working days

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself--most people understand that this is crucial to social life --but the inappropriate, improper sharing of information.
Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts--whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Internet of Things Security - Challenges, Advances, and Analytics (Paperback): Chintan Patel, Nishant Doshi Internet of Things Security - Challenges, Advances, and Analytics (Paperback)
Chintan Patel, Nishant Doshi
R1,861 Discovery Miles 18 610 Ships in 10 - 15 working days

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.

Privacy and Big Data (Paperback): Terence Craig Privacy and Big Data (Paperback)
Terence Craig; Contributions by Mary E. Ludloff
R545 Discovery Miles 5 450 Ships in 18 - 22 working days

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.

Personal data is the hottest commodity on the market today--truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Privacy and Big Data introduces you to the players in the personal data game, and explains the stark differences in how the U.S., Europe, and the rest of the world approach the privacy issue.

You'll learn about: Collectors: social networking titans that collect, share, and sell user data Users: marketing organizations, government agencies, and many others Data markets: companies that aggregate and sell datasets to anyone Regulators: governments with one policy for commercial data use, and another for providing security

Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback): Keith Martin Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback)
Keith Martin
R400 Discovery Miles 4 000 Ships in 9 - 17 working days

Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactions-in short, everything we do online. Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.

How to Protect Yourself from Your Computer (Paperback): Marc-Anthony C Arena How to Protect Yourself from Your Computer (Paperback)
Marc-Anthony C Arena
R460 R432 Discovery Miles 4 320 Save R28 (6%) Ships in 18 - 22 working days
Blackstone's Guide to the Identity Cards Act 2006 (Paperback, New): John Wadham, Caoilfhionn Gallagher, Nicole Chrolavicius Blackstone's Guide to the Identity Cards Act 2006 (Paperback, New)
John Wadham, Caoilfhionn Gallagher, Nicole Chrolavicius
R1,920 Discovery Miles 19 200 Ships in 10 - 15 working days

The Blackstone's Guide Series delivers concise and accessible books covering the latest legislation changes and amendments. Published within weeks of an Act, they offer expert commentary by leading names on the effects, extent and scope of the legislation, plus a full copy of the Act itself. They offer a cost-effective solution to key information needs and are the perfect companion for any practitioner needing to get up to speed with the latest changes. The Identity Cards Act 2006 is a major piece of legislation which will fundamentally change the relationship between the state and the individual for people of all nationalities residing in the UK for more than three months. The Act will affect the operation of much existing legislation, including; the Data Protection Act 1998; the Police and Criminal Evidence Act 1984; the Regulation of Investigatory Powers Act 2000; the Race Relations Act 1976; the Immigration and Asylum Act 1999, and the Asylum and Immigration (Treatment of Claimants) Act 2004. The Act will have an impact on a wide range of legal areas, including; asylum and immigration; data protection and freedom of information; privacy; criminal; human rights; and civil liberties; and will introduce the following; - A complex range of new civil and criminal penalties - a new Commissioner's Office - New ways of working for those providing public services, such as the police, the NHS, the Passport Service, and benefit workers This Guide is written by two experienced practitioners currently based at Liberty, the National Council for Civil Liberties. Structured in a clear and logical way following the parts of the Act, it provides an up-to-date and informative guide, making it an essential purchase for practitioners and organisations working in a number of legal areas.

Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional... Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using Today! (Paperback)
Kevin Donaldson 1
R268 Discovery Miles 2 680 Ships in 18 - 22 working days
Privacy and the Press (Paperback): Joshua Rozenberg Privacy and the Press (Paperback)
Joshua Rozenberg
R1,227 Discovery Miles 12 270 Ships in 10 - 15 working days

Do we need a law of privacy? Should judges be allowed to stop us reading about a footballer's adultery or enjoying pictures of a film star's wedding? Is a super-model's cocaine addiction something that she should be allowed to keep private? And aren't we entitled to walk down the street without having our most intimate activities recorded on security cameras and broadcast to the world? These questions have divided not only the country but also our most senior judges. Drawing a line between justified and unjustified intrusion places great stresses on our legal traditions with some judges favouring an approach which stretches existing laws to grant relief to deserving victims, whilst other judges feel that it would be more honest to simply recognize privacy as a new human right. The latter approach creates further problems: should it be up to Parliament alone to create such a right? And what about free speech? Do the newspapers and the public not have rights too? The issues raised are often highly emotive. Newspapers are not allowed to identify Thompson and Venables, the young men who murdered two-year-old James Bulger, because their lives would be in danger. Nobody may identify Mary Bell, who also killed when she was a child, even though there was no such risk. Will paedophiles be the next to demand lifelong anonymity? Steering a course through this minefield requires a grasp of legal concepts and principles and an understanding of how the law develops. This book explores how the English legal system has had to blend old laws on confidentiality with modern human rights law in order to deal with these problematic issues. Written for non-specialists by one of Britain s best known legal journalists, this book provides a uniquely accessible guide to the legal aspects of this public debate.

Privacy and the Press (Hardcover, New): Joshua Rozenberg Privacy and the Press (Hardcover, New)
Joshua Rozenberg
R2,184 Discovery Miles 21 840 Ships in 10 - 15 working days

Do we need a law of privacy? Should judges be allowed to stop us reading about a footballer's adultery or enjoying pictures of a film star's wedding? Is a super-model's cocaine addiction something that she should be allowed to keep private? And aren't we entitled to walk down the street without having our most intimate activities recorded on security cameras and broadcast to the world?
These questions have divided not only the country but also our most senior judges. Drawing a line between justified and unjustified intrusion places great stresses on our legal traditions: some judges favour stretching existing laws to help deserving victims, whilst others feel it would be more honest simply to recognize privacy as a new human right. The latter approach creates further problems: shouldn't it be up to Parliament alone to create such a right? And what about free speech: don't the newspapers and the public have rights too?
The issues raised are often highly emotive. Newspapers are not allowed to identify Thompson and Venables, the young men who murdered two-year-old James Bulger, because their lives would be in danger. Nobody may identify Mary Bell, who also killed when she was a child, even though there was no such risk. Will paedophiles be the next to demand lifelong anonymity?
Steering a course through this minefield requires a grasp of legal concepts and principles and an understanding of how the law develops. This book explores how the English legal system has had to blend old laws on confidentiality with modern human rights law in order to deal with these problematic issues. Written for non-specialists by one of Britain's best known legal journalists, this book provides a uniquely accessible guide to the legal aspects of this topical debate.

Privacy and the Information Age (Paperback): Serge Gutwirth Privacy and the Information Age (Paperback)
Serge Gutwirth; Translated by Raf Casert
R1,506 Discovery Miles 15 060 Ships in 18 - 22 working days

In a time in which new technologies make it easy to gather and process data, the discussion on privacy tends to focus exclusively on the protecting of personal data. To Serge Gutwirth, privacy involves far more. He advances the intriguing thesis that privacy is in fact the safeguard of personal freedom the safeguard of the individual's freedom to decide who she or he is, what she or he does, and who knows about it. Any restriction on privacy thus means an infringement of personal freedom. And it's exactly this freedom that plays an essential role in every democracy.

New Dark Age - Technology and the End of the Future (Paperback, New edition): James Bridle New Dark Age - Technology and the End of the Future (Paperback, New edition)
James Bridle
R448 R417 Discovery Miles 4 170 Save R31 (7%) Ships in 18 - 22 working days

From the highly acclaimed author of WAYS OF BEING. We live in times of increasing inscrutability. Our news feeds are filled with unverified, unverifiable speculation, much of it automatically generated by anonymous software. As a result, we no longer understand what is happening around us. Underlying all of these trends is a single idea: the belief that quantitative data can provide a coherent model of the world, and the efficacy of computable information to provide us with ways of acting within it. Yet the sheer volume of information available to us today reveals less than we hope. Rather, it heralds a new Dark Age: a world of ever-increasing incomprehension. In his brilliant new work, leading artist and writer James Bridle offers us a warning against the future in which the contemporary promise of a new technologically assisted Enlightenment may just deliver its opposite: an age of complex uncertainty, predictive algorithms, surveillance, and the hollowing out of empathy. Surveying the history of art, technology and information systems he reveals the dark clouds that gather over discussions of the digital sublime.

Personal Medical Information - Security, Engineering, and Ethics (Paperback, Softcover reprint of the original 1st ed. 1997):... Personal Medical Information - Security, Engineering, and Ethics (Paperback, Softcover reprint of the original 1st ed. 1997)
Ross Anderson
R1,478 Discovery Miles 14 780 Ships in 18 - 22 working days

This book originates from an international workshop on personal information held at the Isaac Newton Institute for Mathematical Sciences in Cambridge, UK, in June 1996. The workshop was organized under the joint sponsorship of the British Medical Association and the Isaac Newton Institute in the context of a six-month research program in computer security, cryptology, and coding theory.The revised workshop papers appearing in this volume reflect a lively interdisciplinary exchange of views and ideas between doctors, lawyers, privacy activists, and the computer security community. The volume gives a representative snapshot not merely of the state of the art of the medical computer security art in various countries, but of the complex interplay between human, political, and technical aspects.

Corporate Cyberwar (Paperback): Dr Michael Teng Corporate Cyberwar (Paperback)
Dr Michael Teng
R474 Discovery Miles 4 740 Ships in 18 - 22 working days

Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R867 R746 Discovery Miles 7 460 Save R121 (14%) Ships in 18 - 22 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

The Art of Deception - Controlling the Human Element of Security (Hardcover): KD Mitnick The Art of Deception - Controlling the Human Element of Security (Hardcover)
KD Mitnick
R1,030 R859 Discovery Miles 8 590 Save R171 (17%) Ships in 9 - 17 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Data Privacy - Principles and Practice (Hardcover): Nataraj Venkataramanan, Ashwin Shriram Data Privacy - Principles and Practice (Hardcover)
Nataraj Venkataramanan, Ashwin Shriram
R3,652 Discovery Miles 36 520 Ships in 10 - 15 working days

The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best practices and reflect on the conflicting relationship between privacy and utility. From a practice standpoint, it provides practitioners and researchers with a definitive guide to approach anonymization of various data formats, including multidimensional, longitudinal, time-series, transaction, and graph data. In addition to helping CIOs protect confidential data, it also offers a guideline as to how this can be implemented for a wide range of data at the enterprise level.

Customer Data and Privacy: The Insights You Need from Harvard Business Review - The Insights You Need from Harvard Business... Customer Data and Privacy: The Insights You Need from Harvard Business Review - The Insights You Need from Harvard Business Review (Paperback)
Harvard Business Review, Timothy Morey, Andrew Burt, Christine Moorman, Thomas C. Redman
R404 Discovery Miles 4 040 Ships in 10 - 15 working days

Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues&#8212blockchain, cybersecurity, AI, and more&#8212each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas&#8212and prepare you and your company for the future.

E-Commerce Security and Privacy (Paperback, Softcover reprint of the original 1st ed. 2001): Anup K. Ghosh E-Commerce Security and Privacy (Paperback, Softcover reprint of the original 1st ed. 2001)
Anup K. Ghosh
R2,625 Discovery Miles 26 250 Ships in 18 - 22 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce.The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Cybersecurity Awareness Among Students and Faculty (Hardcover): Abbas Moallem Cybersecurity Awareness Among Students and Faculty (Hardcover)
Abbas Moallem
R1,796 Discovery Miles 17 960 Ships in 10 - 15 working days

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Man Who Founded The ANC - A…
Bongani Ngqulunga Paperback  (9)
R390 R360 Discovery Miles 3 600
Conestoga River - A History
Donald Kautz Hardcover R684 Discovery Miles 6 840
Blood Trail
Tony Park Paperback R310 R281 Discovery Miles 2 810
2022 Nautical Almanac
Uk Hydrographic Hardcover R1,012 R891 Discovery Miles 8 910
Suspects
Danielle Steel Paperback  (3)
R401 Discovery Miles 4 010
Bamboozled - In Search Of Joy In A World…
Melinda Ferguson Paperback R367 Discovery Miles 3 670
In Search of Justice in Thailand's Deep…
John Clifford Holt Hardcover R2,557 Discovery Miles 25 570
Imtiaz Sooliman And The Gift Of The…
Shafiq Morton Paperback  (1)
R360 R332 Discovery Miles 3 320
Chesapeake Bay Deck Boats
Larry S Chowning Hardcover R710 Discovery Miles 7 100
Cruel King - A Royal Elite Book
Rina Kent Paperback R295 R229 Discovery Miles 2 290

 

Partners