0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (126)
  • R250 - R500 (244)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Cyber Security Disasters - History of It Disasters and How to Avoid Them in the Future (Paperback): Matt Olivier Cyber Security Disasters - History of It Disasters and How to Avoid Them in the Future (Paperback)
Matt Olivier
R246 Discovery Miles 2 460 Ships in 18 - 22 working days
The World of Hacking - Meet The Digital World (Paperback): Parth Goyal The World of Hacking - Meet The Digital World (Paperback)
Parth Goyal
R217 Discovery Miles 2 170 Ships in 18 - 22 working days
Control Shift - How Technology Affects You and Your Rights (Paperback): David Meyer Control Shift - How Technology Affects You and Your Rights (Paperback)
David Meyer
R310 Discovery Miles 3 100 Ships in 18 - 22 working days
The Identity Trade - Selling Privacy and Reputation Online (Hardcover): Nora A. Draper The Identity Trade - Selling Privacy and Reputation Online (Hardcover)
Nora A. Draper
R2,009 Discovery Miles 20 090 Ships in 10 - 15 working days

The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity-a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.

Keeping Track of - Passwords (Paperback): Susan Alison Keeping Track of - Passwords (Paperback)
Susan Alison
R195 Discovery Miles 1 950 Ships in 18 - 22 working days
Protect Your Identity - Step-by-Step Guide and Workbook (Paperback): Carrie Kerskie Protect Your Identity - Step-by-Step Guide and Workbook (Paperback)
Carrie Kerskie
R466 Discovery Miles 4 660 Ships in 18 - 22 working days
Cybersecurity for Beginners - Basic Security Threats Everyone Should Know (Paperback): Kelly Fenathra Cybersecurity for Beginners - Basic Security Threats Everyone Should Know (Paperback)
Kelly Fenathra
R258 Discovery Miles 2 580 Ships in 18 - 22 working days
Cybersecurity for Beginners - Basic Network Security Terms Everyone Should Know (Paperback): Kelly Fenathra Cybersecurity for Beginners - Basic Network Security Terms Everyone Should Know (Paperback)
Kelly Fenathra
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
LastPass Guide - Make Your Passwords Wicked Strong (Paperback): Benjamin Bryan LastPass Guide - Make Your Passwords Wicked Strong (Paperback)
Benjamin Bryan
R821 Discovery Miles 8 210 Ships in 18 - 22 working days
2016 Annual Report of Top Cyber Security Incidents (Paperback): Rosemarie Pelletier, George Silowash 2016 Annual Report of Top Cyber Security Incidents (Paperback)
Rosemarie Pelletier, George Silowash; Thomas Hyslip
R210 Discovery Miles 2 100 Ships in 18 - 22 working days
Tor Anonymity Network 101 - An Introduction to The Most Private Part of The Internet (Paperback): Steven Gates Tor Anonymity Network 101 - An Introduction to The Most Private Part of The Internet (Paperback)
Steven Gates
R613 Discovery Miles 6 130 Ships in 18 - 22 working days
Hacking! - This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX... Hacking! - This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX (Paperback)
Grzegorz Nowak
R590 Discovery Miles 5 900 Ships in 18 - 22 working days
Screen Time Log - Daily Track Kids Screenfree Digital Detox, Screen Activities Tracker, For Parents, Journal, Book (Paperback):... Screen Time Log - Daily Track Kids Screenfree Digital Detox, Screen Activities Tracker, For Parents, Journal, Book (Paperback)
Amy Newton
R522 Discovery Miles 5 220 Ships in 18 - 22 working days
Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback): Richard... Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback)
Richard Diver, Gary Bushey; Foreword by Jason S. Rader
R901 Discovery Miles 9 010 Ships in 18 - 22 working days

Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment Key Features Secure your network, infrastructure, data, and applications on Microsoft Azure effectively Integrate artificial intelligence, threat analysis, and automation for optimal security solutions Investigate possible security breaches and gather forensic evidence to prevent modern cyber threats Book DescriptionAzure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). Azure Sentinel not only helps clients identify security issues in their environment, but also uses automation to help resolve these issues. With this book, you'll implement Azure Sentinel and understand how it can help find security incidents in your environment with integrated artificial intelligence, threat analysis, and built-in and community-driven logic. This book starts with an introduction to Azure Sentinel and Log Analytics. You'll get to grips with data collection and management, before learning how to create effective Azure Sentinel queries to detect anomalous behaviors and patterns of activity. As you make progress, you'll understand how to develop solutions that automate the responses required to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this book, you'll have learned how to implement Azure Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Understand how to design and build a security operations center Discover the key components of a cloud security architecture Manage and investigate Azure Sentinel incidents Use playbooks to automate incident responses Understand how to set up Azure Monitor Log Analytics and Azure Sentinel Ingest data into Azure Sentinel from the cloud and on-premises devices Perform threat hunting in Azure Sentinel Who this book is forThis book is for solution architects and system administrators who are responsible for implementing new solutions in their infrastructure. Security analysts who need to monitor and provide immediate security solutions or threat hunters looking to learn how to use Azure Sentinel to investigate possible security breaches and gather forensic evidence will also benefit from this book. Prior experience with cloud security, particularly Azure, is necessary.

Cybersecurity - Advanced and Effective Measures to Secure Your Cyber Networks (Paperback): Elijah Lewis Cybersecurity - Advanced and Effective Measures to Secure Your Cyber Networks (Paperback)
Elijah Lewis
R502 Discovery Miles 5 020 Ships in 18 - 22 working days
Cyber Security - This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense... Cyber Security - This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies and Penetration Testing for Information Systems Security (Paperback)
Zach Codings
R610 Discovery Miles 6 100 Ships in 18 - 22 working days
Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback): Richard... Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback)
Richard Dorsel
R535 Discovery Miles 5 350 Ships in 18 - 22 working days
Hands-On Cybersecurity for Finance - Identify vulnerabilities and secure your financial services from security breaches... Hands-On Cybersecurity for Finance - Identify vulnerabilities and secure your financial services from security breaches (Paperback)
Dr. Erdal Ozkaya, Milad Aslaner
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features Protect your financial environment with cybersecurity practices and methodologies Identify vulnerabilities such as data manipulation and fraudulent transactions Provide end-to-end protection within organizations Book DescriptionOrganizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures. What you will learn Understand the cyber threats faced by organizations Discover how to identify attackers Perform vulnerability assessment, software testing, and pentesting Defend your financial cyberspace using mitigation techniques and remediation plans Implement encryption and decryption Understand how Artificial Intelligence (AI) affects cybersecurity Who this book is forHands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.

Password Keeper - Keep Internet Passwords, Website Address and Usernames Information Logbook, Organizer Record Book, Notebook,... Password Keeper - Keep Internet Passwords, Website Address and Usernames Information Logbook, Organizer Record Book, Notebook, Journal (Paperback)
Amy Newton
R511 Discovery Miles 5 110 Ships in 18 - 22 working days
Digital Privacy - Internet Security to Stop Big Companies from Tracking and Selling Your Data (Paperback): Chris Capra, Eric... Digital Privacy - Internet Security to Stop Big Companies from Tracking and Selling Your Data (Paperback)
Chris Capra, Eric Faster
R484 Discovery Miles 4 840 Ships in 18 - 22 working days
The PIPA - The Path to Compliance; The Exercise of Rights - A Practical Guide to the 'Personal Information Protection Act... The PIPA - The Path to Compliance; The Exercise of Rights - A Practical Guide to the 'Personal Information Protection Act 2016' (Paperback)
Quissumus
R1,214 Discovery Miles 12 140 Ships in 18 - 22 working days

The PIPA provides a new right to individuals in Bermuda and brings the country in line with international standards of privacy protection. The PIPA "The path to compliance; the exercise of rights" provides the reader with a practical guide to the Act both from the perspective of organisations that must comply with its requirements and individuals who might benefit for its protection. It has been written in plain English with examples and suggestions where relevant

What the Heck Is My Password? (Paperback): Beth Casey What the Heck Is My Password? (Paperback)
Beth Casey
R224 Discovery Miles 2 240 Ships in 18 - 22 working days
Cybersecurity, Hacking, and Espionage - a beginners guide (Paperback): Abhinav Vaid Cybersecurity, Hacking, and Espionage - a beginners guide (Paperback)
Abhinav Vaid
R167 Discovery Miles 1 670 Ships in 18 - 22 working days
Protecting Privacy in Video Surveillance (Paperback, 2009 ed.): Andrew Senior Protecting Privacy in Video Surveillance (Paperback, 2009 ed.)
Andrew Senior
R1,454 Discovery Miles 14 540 Ships in 18 - 22 working days

Protecting Privacy in Video Surveillance offers the state of the art from leading researchers and experts in the field. This broad ranging volume discusses the topic from various technical points of view and also examines surveillance from a societal perspective.

A comprehensive introduction carefully guides the reader through the collection of cutting-edge research and current thinking. The technical elements of the field feature topics from MERL blind vision, stealth vision and privacy by de-identifying face images, to using mobile communications to assert privacy from video surveillance, and using wearable computing devices for data collection in surveillance environments. Surveillance and society is approached with discussions of security versus privacy, the rise of surveillance, and focusing on social control.

This rich array of the current research in the field will be an invaluable reference for researchers, as well as graduate students.

The Face of Online Security and Tips to Help Protect You and Your Family - A guide for protecting the ones you love.... The Face of Online Security and Tips to Help Protect You and Your Family - A guide for protecting the ones you love. (Paperback)
Katrina R Garcia
R207 Discovery Miles 2 070 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Best Books gegradeerde leesreeks: Vlak 1…
Best Books Paperback R108 Discovery Miles 1 080
Women's Leadership Quotes
Kayla Stajkovic, Alex Stajkovic Hardcover R523 Discovery Miles 5 230
Heat Kernels for Elliptic and…
Ovidiu Calin, Der-Chen Chang, … Hardcover R2,895 Discovery Miles 28 950
Dictionary of Burning Words of Brilliant…
Josiah Hotchkiss Gilbert Hardcover R1,149 Discovery Miles 11 490
Faber-Castell Starter School Bow Compass…
R100 Discovery Miles 1 000
Interdisciplinary Perspectives on the…
Sarah E. Berger, Regina T. Harbourne, … Hardcover R2,522 Discovery Miles 25 220
Trodat 4911 S-Printy Stock Text Stamp…
R269 R199 Discovery Miles 1 990
Nature-Inspired Algorithms and Applied…
Xin-She Yang Hardcover R5,384 Discovery Miles 53 840
The Last Statues of Antiquity
R.R.R. Smith, Bryan Ward-Perkins Hardcover R5,161 Discovery Miles 51 610
Basic mathematics for economics students…
Derek Yu Paperback R420 Discovery Miles 4 200

 

Partners