0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (230)
  • R500+ (762)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Tor Anonymity Network 101 - An Introduction to The Most Private Part of The Internet (Paperback): Steven Gates Tor Anonymity Network 101 - An Introduction to The Most Private Part of The Internet (Paperback)
Steven Gates
R640 Discovery Miles 6 400 Ships in 18 - 22 working days
Cybersecurity Now (Paperback): George McCracken, Amir Sachs, Fred Hughes Cybersecurity Now (Paperback)
George McCracken, Amir Sachs, Fred Hughes
R382 Discovery Miles 3 820 Ships in 18 - 22 working days
Protecting Privacy in Video Surveillance (Paperback, 2009 ed.): Andrew Senior Protecting Privacy in Video Surveillance (Paperback, 2009 ed.)
Andrew Senior
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

Protecting Privacy in Video Surveillance offers the state of the art from leading researchers and experts in the field. This broad ranging volume discusses the topic from various technical points of view and also examines surveillance from a societal perspective.

A comprehensive introduction carefully guides the reader through the collection of cutting-edge research and current thinking. The technical elements of the field feature topics from MERL blind vision, stealth vision and privacy by de-identifying face images, to using mobile communications to assert privacy from video surveillance, and using wearable computing devices for data collection in surveillance environments. Surveillance and society is approached with discussions of security versus privacy, the rise of surveillance, and focusing on social control.

This rich array of the current research in the field will be an invaluable reference for researchers, as well as graduate students.

The Face of Online Security and Tips to Help Protect You and Your Family - A guide for protecting the ones you love.... The Face of Online Security and Tips to Help Protect You and Your Family - A guide for protecting the ones you love. (Paperback)
Katrina R Garcia
R207 Discovery Miles 2 070 Ships in 18 - 22 working days
Keeping Track of - Passwords (Paperback): Susan Alison Keeping Track of - Passwords (Paperback)
Susan Alison
R195 Discovery Miles 1 950 Ships in 18 - 22 working days
Large-Scale Data Streaming, Processing, and Blockchain Security (Paperback): Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini Large-Scale Data Streaming, Processing, and Blockchain Security (Paperback)
Hemraj Saini, Geetanjali Rathee, Dinesh Kumar Saini
R4,729 Discovery Miles 47 290 Ships in 18 - 22 working days

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one's personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements. Large-Scale Data Streaming, Processing, and Blockchain Security is a collection of innovative research that explores the latest methodologies, modeling, and simulations for coping with the generation and management of large-scale data in both scientific and individual applications. Featuring coverage on a wide range of topics including security models, internet of things, and collaborative filtering, this book is ideally designed for entrepreneurs, security analysts, IT consultants, security professionals, programmers, computer technicians, data scientists, technology developers, engineers, researchers, academicians, and students.

Under Attack - Federal Cybersecurity and the Opm Data Breach (Paperback): Committee on Homeland Security and Gover Under Attack - Federal Cybersecurity and the Opm Data Breach (Paperback)
Committee on Homeland Security and Gover
R471 Discovery Miles 4 710 Ships in 18 - 22 working days
Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback):... Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback)
Elijah Lewis
R506 Discovery Miles 5 060 Ships in 18 - 22 working days
Happy 67th Birthday - 67 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a... Happy 67th Birthday - 67 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Happy 82nd Birthday - 82 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a... Happy 82nd Birthday - 82 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Attribute Considerations for Access Control Systems - NIST Special Publication 800-205 (Paperback): National Institute of... Attribute Considerations for Access Control Systems - NIST Special Publication 800-205 (Paperback)
National Institute of Standards and Tech
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Happy 81st Birthday - 81 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a... Happy 81st Birthday - 81 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback): Richard... Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback)
Richard Dorsel
R535 Discovery Miles 5 350 Ships in 18 - 22 working days
The Truth about Social Media (Paperback): Priyanka Gulshan The Truth about Social Media (Paperback)
Priyanka Gulshan
R195 Discovery Miles 1 950 Ships in 18 - 22 working days
Applied Approach to Privacy and Security for the Internet of Things (Paperback): Parag Chatterjee, Emmanuel Benoist, Asoke Nath Applied Approach to Privacy and Security for the Internet of Things (Paperback)
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
R4,972 Discovery Miles 49 720 Ships in 18 - 22 working days

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

How to Destroy Surveillance Capitalism (Paperback): Cory Doctorow How to Destroy Surveillance Capitalism (Paperback)
Cory Doctorow
R291 R270 Discovery Miles 2 700 Save R21 (7%) Ships in 18 - 22 working days
Kali Linux 2018: Assuring Security by Penetration Testing - Unleash the full potential of Kali Linux 2018, now with updated... Kali Linux 2018: Assuring Security by Penetration Testing - Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition (Paperback, 4th Revised edition)
Shiva V.N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, …
R1,243 Discovery Miles 12 430 Ships in 18 - 22 working days

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book DescriptionKali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is forThis fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book

Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback):... Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback)
Codaspy'19
R2,604 Discovery Miles 26 040 Ships in 18 - 22 working days
Cybersecurity essentials (Paperback): Pawel Winowicz Cybersecurity essentials (Paperback)
Pawel Winowicz
R136 Discovery Miles 1 360 Ships in 18 - 22 working days
Infinity Ethical Hacking - Learn basic to advance hacks (Paperback): Arthur S Sapp Infinity Ethical Hacking - Learn basic to advance hacks (Paperback)
Arthur S Sapp
R406 Discovery Miles 4 060 Ships in 18 - 22 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
The Personal Digital Resilience Handbook - An essential guide to safe, secure and robust use of everyday technology... The Personal Digital Resilience Handbook - An essential guide to safe, secure and robust use of everyday technology (Paperback)
David Wild
R299 R277 Discovery Miles 2 770 Save R22 (7%) Ships in 18 - 22 working days
Modern Theories and Practices for Cyber Ethics and Security Compliance (Paperback): Winfred Yaokumah, Muttukrishnan Rajarajan,... Modern Theories and Practices for Cyber Ethics and Security Compliance (Paperback)
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

Password Keeper - Keep Internet Passwords, Website Address and Usernames Information Logbook, Organizer Record Book, Notebook,... Password Keeper - Keep Internet Passwords, Website Address and Usernames Information Logbook, Organizer Record Book, Notebook, Journal (Paperback)
Amy Newton
R511 Discovery Miles 5 110 Ships in 18 - 22 working days
AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS... AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS (Paperback)
Heartin Kanikathottu
R1,324 Discovery Miles 13 240 Ships in 18 - 22 working days

Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices Key Features Explore useful recipes for implementing robust cloud security solutions on AWS Monitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and Macie Prepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offerings Book DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation. The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security - Specialty certification. What you will learn Create and manage users, groups, roles, and policies across accounts Use AWS Managed Services for logging, monitoring, and auditing Check compliance with AWS Managed Services that use machine learning Provide security and availability for EC2 instances and applications Secure data using symmetric and asymmetric encryption Manage user pools and identity pools with federated login Who this book is forIf you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,137 Discovery Miles 71 370
Handbook of Research on Intelligent Data…
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi Hardcover R9,365 Discovery Miles 93 650
Using Computational Intelligence for the…
Romil Rawat, Upinder Kaur, … Hardcover R6,212 Discovery Miles 62 120
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970
Information And Communications…
Dana van der Merwe Paperback R1,320 R1,208 Discovery Miles 12 080
A Corporate Librarian's Guide to…
Phyllis L. Elin Paperback R604 R548 Discovery Miles 5 480
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R485 R265 Discovery Miles 2 650
Privacy and Security Policies in Big…
Sharvari Tamane, Vijender Kumar Solanki, … Hardcover R5,297 Discovery Miles 52 970
Permanent Record
Edward Snowden Paperback R299 R271 Discovery Miles 2 710
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R401 Discovery Miles 4 010

 

Partners