0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (119)
  • R250 - R500 (219)
  • R500+ (778)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Large-Scale Data Streaming, Processing, and Blockchain Security (Paperback): Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini Large-Scale Data Streaming, Processing, and Blockchain Security (Paperback)
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini
R4,729 Discovery Miles 47 290 Ships in 18 - 22 working days

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one's personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.

Senior Cyber - Best Security Practices for Your Golden Years (Paperback): Scott N Schober, Craig W Schober Senior Cyber - Best Security Practices for Your Golden Years (Paperback)
Scott N Schober, Craig W Schober
R460 R431 Discovery Miles 4 310 Save R29 (6%) Ships in 18 - 22 working days
#Myprivacy #Myright - Protect It While You Can (Paperback): Robin M Singh #Myprivacy #Myright - Protect It While You Can (Paperback)
Robin M Singh
R901 Discovery Miles 9 010 Ships in 18 - 22 working days
Applied Approach to Privacy and Security for the Internet of Things (Paperback): Parag Chatterjee, Emmanuel Benoist, Asoke Nath Applied Approach to Privacy and Security for the Internet of Things (Paperback)
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
R4,972 Discovery Miles 49 720 Ships in 18 - 22 working days

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Hacking! - This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX... Hacking! - This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX (Paperback)
Grzegorz Nowak
R590 Discovery Miles 5 900 Ships in 18 - 22 working days
Cissp - Beginners Guide to Incident Management Processes (Cybersecurity and Ethical Hacking to Information Security... Cissp - Beginners Guide to Incident Management Processes (Cybersecurity and Ethical Hacking to Information Security Professionals) (Paperback)
Michael Watley
R438 R405 Discovery Miles 4 050 Save R33 (8%) Ships in 18 - 22 working days
2017 Annual Report of Top Cyber Security Incidents (Paperback): Rosemarie Pelletier, George Silowash 2017 Annual Report of Top Cyber Security Incidents (Paperback)
Rosemarie Pelletier, George Silowash; Thomas Hyslip
R245 Discovery Miles 2 450 Ships in 18 - 22 working days
The Next Floor (Paperback): Pete Hancock The Next Floor (Paperback)
Pete Hancock
R556 Discovery Miles 5 560 Ships in 18 - 22 working days
Tor Browser - Learn How to Claim Your Privacy in the Internet World and Hide Your Ip (Hide Your Ip Address and Ensure Internet... Tor Browser - Learn How to Claim Your Privacy in the Internet World and Hide Your Ip (Hide Your Ip Address and Ensure Internet Privacy) (Paperback)
Joseph Robson
R437 R404 Discovery Miles 4 040 Save R33 (8%) Ships in 18 - 22 working days
Cyber Security - This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense... Cyber Security - This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies and Penetration Testing for Information Systems Security (Paperback)
Zach Codings
R610 Discovery Miles 6 100 Ships in 18 - 22 working days
Modern Day Surveillance Ecosystem and Impacts on Privacy (Paperback): Ananda Mitra Modern Day Surveillance Ecosystem and Impacts on Privacy (Paperback)
Ananda Mitra
R4,138 Discovery Miles 41 380 Ships in 18 - 22 working days

The notion of surveillance has become increasingly more crucial in public conversation as new tools of observation are obtained by many different players. The traditional notion of "overseeing" is being increasingly replaced by multi-level surveillance where many different actors, at different levels of hierarchy, from the child surveilling the parent to the state surveilling its citizens, are entering the surveillance theater. This creates a unique surveillance ecosystem where the individual is observed not only as an analog flesh-and-blood body moving through real spaces such as a shopping mall, but also tracked as a data point where the volume of data is perpetually and permanently expanding as the digital life story is inscribed in the digital spaces. The combined narrative of the individual is now under surveillance. Modern Day Surveillance Ecosystem and Impacts on Privacy navigates the reader through an understanding of the self as a narrative element that is open for observation and analysis. This book provides a broad-based and theoretically grounded look at the overall processes of surveillance in a global system. Covering topics including commodity, loss of privacy, and big data, this text is essential for researchers, government officials, policymakers, security analysts, lawmakers, teachers, professors, graduate and undergraduate students, practitioners, and academicians interested in communication, technology, surveillance, privacy, and more.

Library Patrons' Privacy - Questions and Answers (Paperback): Sandra J. Valenti, Brady D. Lund, Matthew A. Beckstrom Library Patrons' Privacy - Questions and Answers (Paperback)
Sandra J. Valenti, Brady D. Lund, Matthew A. Beckstrom
R1,730 Discovery Miles 17 300 Ships in 18 - 22 working days

A quick, easy-to-read synthesis of theory, guidelines, and evidence-based research, this book offers timely, practical guidance for library and information professionals who must navigate ethical crises in information privacy and stay on top of emerging privacy trends. Emerging technologies create new concerns about information privacy within library and information organizations, and many information professionals lack guidance on how to navigate the ethical crises that emerge when information privacy and library policy clash. What should we do when a patron leaves something behind? How do we justify filtering internet access while respecting accessibility and privacy? How do we balance new technologies that provide anonymity with the library's need to prevent the illegal use of their facilities? Library Patrons' Privacy presents clear, conversational, evidence-based guidance on how to navigate these ethical questions in information privacy. Ideas from professional organizations, government entities, scholarly publications, and personal experiences are synthesized into an approachable guide for librarians at all stages of their career. This guide, designed by three experienced LIS scholars and professionals, is a quick and enjoyable read that students and professionals of all levels of technical knowledge and skill will find useful and applicable to their libraries. Presents practical, evidence-based guidance for navigating common ethical problems in library and information science Introduces library and information professionals and students to emerging issues in information privacy Provides students and practitioners with a foundation of practical problem-solving strategies for handling information privacy issues in emerging technologies Guides the design of new information privacy policy in all types of libraries Encourages engagement with information privacy technologies to assist in fulfilling the American Library Association's core values

Ethical Hacking - A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and... Ethical Hacking - A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment (Paperback)
Zach Codings
R437 Discovery Miles 4 370 Ships in 18 - 22 working days
The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market (Paperback): Bernd Skiera, Klaus M... The Impact of the General Data Protection Regulation (GDPR) on the Online Advertising Market (Paperback)
Bernd Skiera, Klaus M Miller, Yuxi Jin
R755 Discovery Miles 7 550 Ships in 18 - 22 working days
Electronic Crime Scene Investigation - A Guide for First Responders (Paperback): Department of Justice Electronic Crime Scene Investigation - A Guide for First Responders (Paperback)
Department of Justice
R486 Discovery Miles 4 860 Ships in 18 - 22 working days
Report of the Attorney General's Cyber Digital Task Force - 2018 (Paperback): Department of Justice Report of the Attorney General's Cyber Digital Task Force - 2018 (Paperback)
Department of Justice
R981 Discovery Miles 9 810 Ships in 18 - 22 working days
Cybersecurity essentials - Beginners guide - Step-by-step manual with ten methods to protect your privacy online (Paperback):... Cybersecurity essentials - Beginners guide - Step-by-step manual with ten methods to protect your privacy online (Paperback)
Gianluca Amadio, David Costa
R247 Discovery Miles 2 470 Ships in 18 - 22 working days
Cybersecurity - Best Tips and Tricks to Learn and Secure Your Cyber Networks (Paperback): Elijah Lewis Cybersecurity - Best Tips and Tricks to Learn and Secure Your Cyber Networks (Paperback)
Elijah Lewis
R492 Discovery Miles 4 920 Ships in 18 - 22 working days
Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback): Richard... Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback)
Richard Diver, Gary Bushey; Foreword by Jason S. Rader
R901 Discovery Miles 9 010 Ships in 18 - 22 working days

Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment Key Features Secure your network, infrastructure, data, and applications on Microsoft Azure effectively Integrate artificial intelligence, threat analysis, and automation for optimal security solutions Investigate possible security breaches and gather forensic evidence to prevent modern cyber threats Book DescriptionAzure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). Azure Sentinel not only helps clients identify security issues in their environment, but also uses automation to help resolve these issues. With this book, you'll implement Azure Sentinel and understand how it can help find security incidents in your environment with integrated artificial intelligence, threat analysis, and built-in and community-driven logic. This book starts with an introduction to Azure Sentinel and Log Analytics. You'll get to grips with data collection and management, before learning how to create effective Azure Sentinel queries to detect anomalous behaviors and patterns of activity. As you make progress, you'll understand how to develop solutions that automate the responses required to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this book, you'll have learned how to implement Azure Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Understand how to design and build a security operations center Discover the key components of a cloud security architecture Manage and investigate Azure Sentinel incidents Use playbooks to automate incident responses Understand how to set up Azure Monitor Log Analytics and Azure Sentinel Ingest data into Azure Sentinel from the cloud and on-premises devices Perform threat hunting in Azure Sentinel Who this book is forThis book is for solution architects and system administrators who are responsible for implementing new solutions in their infrastructure. Security analysts who need to monitor and provide immediate security solutions or threat hunters looking to learn how to use Azure Sentinel to investigate possible security breaches and gather forensic evidence will also benefit from this book. Prior experience with cloud security, particularly Azure, is necessary.

Ethical Hacking - Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking (Paperback): Brian... Ethical Hacking - Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking (Paperback)
Brian Walker
R494 Discovery Miles 4 940 Ships in 18 - 22 working days
Internet Password Organizer - Golden Retriever Dog (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Golden Retriever Dog (Password Log Book) (Paperback)
Peter Paker P K
R208 Discovery Miles 2 080 Ships in 18 - 22 working days
Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server (Paperback): Hidaia Mahmooa Alassouli Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server (Paperback)
Hidaia Mahmooa Alassouli
R405 Discovery Miles 4 050 Ships in 18 - 22 working days
The World of Hacking - Meet The Digital World (Paperback): Parth Goyal The World of Hacking - Meet The Digital World (Paperback)
Parth Goyal
R217 Discovery Miles 2 170 Ships in 18 - 22 working days
I'm Dead, But My Password Is Not (Paperback): Josh K Howard I'm Dead, But My Password Is Not (Paperback)
Josh K Howard
R267 Discovery Miles 2 670 Ships in 18 - 22 working days
Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback): Michael I. Kaplan Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback)
Michael I. Kaplan
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R401 Discovery Miles 4 010
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R762 Discovery Miles 7 620
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R578 Discovery Miles 5 780
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,416 Discovery Miles 94 160
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
Handbook of Research on Intelligent Data…
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi Hardcover R9,365 Discovery Miles 93 650
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,311 Discovery Miles 73 110
A Corporate Librarian's Guide to…
Phyllis L. Elin Paperback R604 R548 Discovery Miles 5 480
Using Computational Intelligence for the…
Romil Rawat, Upinder Kaur, … Hardcover R6,212 Discovery Miles 62 120
A Study of Black Hole Attack Solutions…
Elahe Fazeldehkordi, I.S. Dr. Amiri, … Paperback R1,277 Discovery Miles 12 770

 

Partners