0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (223)
  • R500+ (770)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Cissp - Beginners Guide to Incident Management Processes (Cybersecurity and Ethical Hacking to Information Security... Cissp - Beginners Guide to Incident Management Processes (Cybersecurity and Ethical Hacking to Information Security Professionals) (Paperback)
Michael Watley
R438 R405 Discovery Miles 4 050 Save R33 (8%) Ships in 18 - 22 working days
A Corporate Librarian's Guide to Information Governance and Data Privacy (Paperback): Phyllis L. Elin A Corporate Librarian's Guide to Information Governance and Data Privacy (Paperback)
Phyllis L. Elin
R604 R548 Discovery Miles 5 480 Save R56 (9%) Ships in 18 - 22 working days

With the expansion of technology and governance, the information governance industry has experienced dramatic and often, sudden changes. Among the most important shifts are the proliferation of data privacy rules and regulations, the exponential growth of data and the need for removing redundant, obsolete, and trivial information and the growing threat of litigation and regulatory fines based on a failure to properly keep records and manage data. At the same time, longstanding information governance standards and best practices exist, which transcend the sudden vicissitudes of the day.This volume focuses on these core IG principles, with an emphasis on how they apply to our target audience, which includes law librarians, legal and research staff and other individuals and departments in both the public and private sectors who engage deeply with regulatory compliance matters. Core topics that will be addressed include: the importance of implementing and maintaining cohesive records management workflows that implement the classic principles of capturing, checking, recording, consolidation, and review; the classic records management principles of Accountability, Transparency, Integrity, Protection, Compliance, Accessibility, Retention and Disposition; and archives Management and the two principles of Providence and Original Order.

Online Security - protecting your personal information (Paperback): Skyline Online Security - protecting your personal information (Paperback)
Skyline
R247 Discovery Miles 2 470 Ships in 18 - 22 working days
Happy 51st Birthday Shithead - Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large print,... Happy 51st Birthday Shithead - Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large print, Paperback, Large type / large print edition)
Karlon Douglas; Level Up Designs, Karlon Douglas
R214 Discovery Miles 2 140 Ships in 18 - 22 working days
KAT - A Kid's Guide to Staying Safe Online - A Kid's Guide to Staying Safe Online (Paperback): Kids Against... KAT - A Kid's Guide to Staying Safe Online - A Kid's Guide to Staying Safe Online (Paperback)
Kids Against Trafficking
R898 R777 Discovery Miles 7 770 Save R121 (13%) Ships in 18 - 22 working days
7 Rules to Influence Behaviour and Win at Cyber Security Awareness (Paperback): Joshi D Chirag 7 Rules to Influence Behaviour and Win at Cyber Security Awareness (Paperback)
Joshi D Chirag
R441 Discovery Miles 4 410 Ships in 18 - 22 working days
Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation... Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation (Paperback)
Harpreet Singh, Himanshu Sharma
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

Senior Cyber - Best Security Practices for Your Golden Years (Paperback): Scott N Schober, Craig W Schober Senior Cyber - Best Security Practices for Your Golden Years (Paperback)
Scott N Schober, Craig W Schober
R460 R431 Discovery Miles 4 310 Save R29 (6%) Ships in 18 - 22 working days
The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market (Paperback): Bernd Skiera, Klaus M... The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market (Paperback)
Bernd Skiera, Klaus M Miller, Yuxi Jin
R755 Discovery Miles 7 550 Ships in 18 - 22 working days
The Modern Parent - Raising a great kid in the digital world (Paperback): Martine Oglethorpe The Modern Parent - Raising a great kid in the digital world (Paperback)
Martine Oglethorpe
R449 Discovery Miles 4 490 Ships in 18 - 22 working days
Tor Browser - Learn How to Claim Your Privacy in the Internet World and Hide Your Ip (Hide Your Ip Address and Ensure Internet... Tor Browser - Learn How to Claim Your Privacy in the Internet World and Hide Your Ip (Hide Your Ip Address and Ensure Internet Privacy) (Paperback)
Joseph Robson
R437 R404 Discovery Miles 4 040 Save R33 (8%) Ships in 18 - 22 working days
I Can't Remember My Password - Password and Username Keeper (Paperback): Smw Publishing I Can't Remember My Password - Password and Username Keeper (Paperback)
Smw Publishing
R199 Discovery Miles 1 990 Ships in 18 - 22 working days
Developing Cyber Resilient Systems - A Systems Security Engineering Approach: NIST SP 800-160 Volume 2 (Paperback): National... Developing Cyber Resilient Systems - A Systems Security Engineering Approach: NIST SP 800-160 Volume 2 (Paperback)
National Institute of Standards and Tech
R690 Discovery Miles 6 900 Ships in 18 - 22 working days
The Personal Digital Resilience Handbook - An essential guide to safe, secure and robust use of everyday technology... The Personal Digital Resilience Handbook - An essential guide to safe, secure and robust use of everyday technology (Paperback)
David Wild
R299 R277 Discovery Miles 2 770 Save R22 (7%) Ships in 18 - 22 working days
Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Paperback): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Paperback)
Scott N Schober, Craig W Schober
R473 R447 Discovery Miles 4 470 Save R26 (5%) Ships in 18 - 22 working days
Ethical Hacking - Tips and Tricks to Learn Hacking Quickly and Efficiently (The Complete Beginner's Guide to Learning... Ethical Hacking - Tips and Tricks to Learn Hacking Quickly and Efficiently (The Complete Beginner's Guide to Learning Ethical Hacking) (Paperback)
Diane Walker
R438 R405 Discovery Miles 4 050 Save R33 (8%) Ships in 18 - 22 working days
You Are The #1 Target (Hardcover): The World Experts You Are The #1 Target (Hardcover)
The World Experts
R642 Discovery Miles 6 420 Ships in 18 - 22 working days
Identity Theft - Managing Risk of Private Information Online (Paperback): A E Ola Identity Theft - Managing Risk of Private Information Online (Paperback)
A E Ola
R271 Discovery Miles 2 710 Ships in 18 - 22 working days
#Myprivacy #Myright - Protect It While You Can (Paperback): Robin M Singh #Myprivacy #Myright - Protect It While You Can (Paperback)
Robin M Singh
R901 Discovery Miles 9 010 Ships in 18 - 22 working days
2017 Annual Report of Top Cyber Security Incidents (Paperback): Rosemarie Pelletier, George Silowash 2017 Annual Report of Top Cyber Security Incidents (Paperback)
Rosemarie Pelletier, George Silowash; Thomas Hyslip
R245 Discovery Miles 2 450 Ships in 18 - 22 working days
The Next Floor (Paperback): Pete Hancock The Next Floor (Paperback)
Pete Hancock
R556 Discovery Miles 5 560 Ships in 18 - 22 working days
Library Patrons' Privacy - Questions and Answers (Paperback): Sandra J. Valenti, Brady D. Lund, Matthew A. Beckstrom Library Patrons' Privacy - Questions and Answers (Paperback)
Sandra J. Valenti, Brady D. Lund, Matthew A. Beckstrom
R1,730 Discovery Miles 17 300 Ships in 18 - 22 working days

A quick, easy-to-read synthesis of theory, guidelines, and evidence-based research, this book offers timely, practical guidance for library and information professionals who must navigate ethical crises in information privacy and stay on top of emerging privacy trends. Emerging technologies create new concerns about information privacy within library and information organizations, and many information professionals lack guidance on how to navigate the ethical crises that emerge when information privacy and library policy clash. What should we do when a patron leaves something behind? How do we justify filtering internet access while respecting accessibility and privacy? How do we balance new technologies that provide anonymity with the library's need to prevent the illegal use of their facilities? Library Patrons' Privacy presents clear, conversational, evidence-based guidance on how to navigate these ethical questions in information privacy. Ideas from professional organizations, government entities, scholarly publications, and personal experiences are synthesized into an approachable guide for librarians at all stages of their career. This guide, designed by three experienced LIS scholars and professionals, is a quick and enjoyable read that students and professionals of all levels of technical knowledge and skill will find useful and applicable to their libraries. Presents practical, evidence-based guidance for navigating common ethical problems in library and information science Introduces library and information professionals and students to emerging issues in information privacy Provides students and practitioners with a foundation of practical problem-solving strategies for handling information privacy issues in emerging technologies Guides the design of new information privacy policy in all types of libraries Encourages engagement with information privacy technologies to assist in fulfilling the American Library Association's core values

The Truth about Social Media (Paperback): Priyanka Gulshan The Truth about Social Media (Paperback)
Priyanka Gulshan
R195 Discovery Miles 1 950 Ships in 18 - 22 working days
Ethical Hacking - A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and... Ethical Hacking - A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment (Paperback)
Zach Codings
R437 Discovery Miles 4 370 Ships in 18 - 22 working days
Electronic Crime Scene Investigation - A Guide for First Responders (Paperback): Department of Justice Electronic Crime Scene Investigation - A Guide for First Responders (Paperback)
Department of Justice
R486 Discovery Miles 4 860 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Winter's Tale
William Shakespeare Hardcover R492 Discovery Miles 4 920
Alien Clay
Adrian Tchaikovsky Paperback R385 R349 Discovery Miles 3 490
Explorations in Christian Theology and…
Philip G. Ziegler Paperback R1,376 Discovery Miles 13 760
Illustrations of Shakespeare, and of…
Francis Douce Paperback R748 Discovery Miles 7 480
Policies and Research in Identity…
Elisabeth De Leeuw, Simone Fischer-Hubner, … Hardcover R1,402 Discovery Miles 14 020
Principles and Applications of Fourier…
R K Tyson Paperback R750 Discovery Miles 7 500
Screen Adaptations: Shakespeare's Hamlet…
Samuel Crowl Hardcover R3,154 Discovery Miles 31 540
Parametric Analog Signal Amplification…
Joao P. Oliveira, Joao Goes Hardcover R2,658 Discovery Miles 26 580
Othello
P Edmondson, Stuart Hampton-Reeves Hardcover R2,361 Discovery Miles 23 610
Dune - The Duke of Caladan
Brian Herbert, Kevin J. Anderson Hardcover R894 Discovery Miles 8 940

 

Partners