0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (161)
  • R250 - R500 (191)
  • R500+ (820)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The World of Hacking - Meet The Digital World (Paperback): Parth Goyal The World of Hacking - Meet The Digital World (Paperback)
Parth Goyal
R248 Discovery Miles 2 480 Ships in 10 - 15 working days
Control Shift - How Technology Affects You and Your Rights (Paperback): David Meyer Control Shift - How Technology Affects You and Your Rights (Paperback)
David Meyer
R354 Discovery Miles 3 540 Ships in 10 - 15 working days
Keeping Track of - Passwords (Paperback): Susan Alison Keeping Track of - Passwords (Paperback)
Susan Alison
R223 Discovery Miles 2 230 Ships in 10 - 15 working days
Protect Your Identity - Step-by-Step Guide and Workbook (Paperback): Carrie Kerskie Protect Your Identity - Step-by-Step Guide and Workbook (Paperback)
Carrie Kerskie
R523 Discovery Miles 5 230 Ships in 10 - 15 working days
I'm Dead, But My Password Is Not (Paperback): Josh K Howard I'm Dead, But My Password Is Not (Paperback)
Josh K Howard
R305 Discovery Miles 3 050 Ships in 10 - 15 working days
Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback): Sandra Estok Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback)
Sandra Estok
R613 R550 Discovery Miles 5 500 Save R63 (10%) Ships in 10 - 15 working days
The PIPA - The Path to Compliance; The Exercise of Rights - A Practical Guide to the 'Personal Information Protection Act... The PIPA - The Path to Compliance; The Exercise of Rights - A Practical Guide to the 'Personal Information Protection Act 2016' (Paperback)
Quissumus
R1,376 Discovery Miles 13 760 Ships in 10 - 15 working days

The PIPA provides a new right to individuals in Bermuda and brings the country in line with international standards of privacy protection. The PIPA "The path to compliance; the exercise of rights" provides the reader with a practical guide to the Act both from the perspective of organisations that must comply with its requirements and individuals who might benefit for its protection. It has been written in plain English with examples and suggestions where relevant

Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback):... Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback)
Codaspy'19
R2,964 Discovery Miles 29 640 Ships in 10 - 15 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R378 R357 Discovery Miles 3 570 Save R21 (6%) Ships in 10 - 15 working days
Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R356 R330 Discovery Miles 3 300 Save R26 (7%) Ships in 10 - 15 working days
Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R355 R330 Discovery Miles 3 300 Save R25 (7%) Ships in 10 - 15 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Gray Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Gray Cover (Paperback)
Norman M Pray
R191 Discovery Miles 1 910 Ships in 10 - 15 working days
2016 Annual Report of Top Cyber Security Incidents (Paperback): Rosemarie Pelletier, George Silowash 2016 Annual Report of Top Cyber Security Incidents (Paperback)
Rosemarie Pelletier, George Silowash; Thomas Hyslip
R240 Discovery Miles 2 400 Ships in 10 - 15 working days
Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback)
Harris Schwartz
R613 Discovery Miles 6 130 Ships in 10 - 15 working days
AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS... AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS (Paperback)
Heartin Kanikathottu
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices Key Features Explore useful recipes for implementing robust cloud security solutions on AWS Monitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and Macie Prepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offerings Book DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation. The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security - Specialty certification. What you will learn Create and manage users, groups, roles, and policies across accounts Use AWS Managed Services for logging, monitoring, and auditing Check compliance with AWS Managed Services that use machine learning Provide security and availability for EC2 instances and applications Secure data using symmetric and asymmetric encryption Manage user pools and identity pools with federated login Who this book is forIf you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.

Hacking! - This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX... Hacking! - This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX (Paperback)
Grzegorz Nowak
R663 Discovery Miles 6 630 Ships in 10 - 15 working days
Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback)
Alex Wagner
R774 R681 Discovery Miles 6 810 Save R93 (12%) Ships in 10 - 15 working days
Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback): Richard... Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback)
Richard Diver, Gary Bushey; Foreword by Jason S. Rader
R1,018 Discovery Miles 10 180 Ships in 10 - 15 working days

Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment Key Features Secure your network, infrastructure, data, and applications on Microsoft Azure effectively Integrate artificial intelligence, threat analysis, and automation for optimal security solutions Investigate possible security breaches and gather forensic evidence to prevent modern cyber threats Book DescriptionAzure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). Azure Sentinel not only helps clients identify security issues in their environment, but also uses automation to help resolve these issues. With this book, you'll implement Azure Sentinel and understand how it can help find security incidents in your environment with integrated artificial intelligence, threat analysis, and built-in and community-driven logic. This book starts with an introduction to Azure Sentinel and Log Analytics. You'll get to grips with data collection and management, before learning how to create effective Azure Sentinel queries to detect anomalous behaviors and patterns of activity. As you make progress, you'll understand how to develop solutions that automate the responses required to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this book, you'll have learned how to implement Azure Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Understand how to design and build a security operations center Discover the key components of a cloud security architecture Manage and investigate Azure Sentinel incidents Use playbooks to automate incident responses Understand how to set up Azure Monitor Log Analytics and Azure Sentinel Ingest data into Azure Sentinel from the cloud and on-premises devices Perform threat hunting in Azure Sentinel Who this book is forThis book is for solution architects and system administrators who are responsible for implementing new solutions in their infrastructure. Security analysts who need to monitor and provide immediate security solutions or threat hunters looking to learn how to use Azure Sentinel to investigate possible security breaches and gather forensic evidence will also benefit from this book. Prior experience with cloud security, particularly Azure, is necessary.

Cybersecurity - Advanced and Effective Measures to Secure Your Cyber Networks (Paperback): Elijah Lewis Cybersecurity - Advanced and Effective Measures to Secure Your Cyber Networks (Paperback)
Elijah Lewis
R562 Discovery Miles 5 620 Ships in 10 - 15 working days
Protecting Privacy in Video Surveillance (Paperback, 2009 ed.): Andrew Senior Protecting Privacy in Video Surveillance (Paperback, 2009 ed.)
Andrew Senior
R1,650 Discovery Miles 16 500 Ships in 10 - 15 working days

Protecting Privacy in Video Surveillance offers the state of the art from leading researchers and experts in the field. This broad ranging volume discusses the topic from various technical points of view and also examines surveillance from a societal perspective.

A comprehensive introduction carefully guides the reader through the collection of cutting-edge research and current thinking. The technical elements of the field feature topics from MERL blind vision, stealth vision and privacy by de-identifying face images, to using mobile communications to assert privacy from video surveillance, and using wearable computing devices for data collection in surveillance environments. Surveillance and society is approached with discussions of security versus privacy, the rise of surveillance, and focusing on social control.

This rich array of the current research in the field will be an invaluable reference for researchers, as well as graduate students.

Shield Your Privacy - 15 Ways To Protect Your Personal Information (Hardcover): Heather Nickerson Shield Your Privacy - 15 Ways To Protect Your Personal Information (Hardcover)
Heather Nickerson
R488 Discovery Miles 4 880 Ships in 10 - 15 working days
Cyber Security - This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense... Cyber Security - This Book Includes: Hacking with Kali Linux, Ethical Hacking. Learn How to Manage Cyber Risks Using Defense Strategies and Penetration Testing for Information Systems Security (Paperback)
Zach Codings
R685 Discovery Miles 6 850 Ships in 10 - 15 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - Anchor Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Size (6 x 9 inches) - 100 Pages - Anchor Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R195 Discovery Miles 1 950 Ships in 10 - 15 working days
Hands-On Cybersecurity for Finance - Identify vulnerabilities and secure your financial services from security breaches... Hands-On Cybersecurity for Finance - Identify vulnerabilities and secure your financial services from security breaches (Paperback)
Dr. Erdal Ozkaya, Milad Aslaner
R1,248 Discovery Miles 12 480 Ships in 10 - 15 working days

A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features Protect your financial environment with cybersecurity practices and methodologies Identify vulnerabilities such as data manipulation and fraudulent transactions Provide end-to-end protection within organizations Book DescriptionOrganizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. The book begins by providing an overall description of cybersecurity, guiding you through some of the most important services and technologies currently at risk from cyber threats. Once you have familiarized yourself with the topic, you will explore specific technologies and threats based on case studies and real-life scenarios. As you progress through the chapters, you will discover vulnerabilities and bugs (including the human risk factor), gaining an expert-level view of the most recent threats. You'll then explore information on how you can achieve data and infrastructure protection. In the concluding chapters, you will cover recent and significant updates to procedures and configurations, accompanied by important details related to cybersecurity research and development in IT-based financial services. By the end of the book, you will have gained a basic understanding of the future of information security and will be able to protect financial services and their related infrastructures. What you will learn Understand the cyber threats faced by organizations Discover how to identify attackers Perform vulnerability assessment, software testing, and pentesting Defend your financial cyberspace using mitigation techniques and remediation plans Implement encryption and decryption Understand how Artificial Intelligence (AI) affects cybersecurity Who this book is forHands-On Cybersecurity for Finance is for you if you are a security architect, cyber risk manager, or pentester looking to secure your organization. Basic understanding of cybersecurity tools and practices will help you get the most out of this book.

The Successful Privacy Mindset - Proven Security Hacks And Tricks To Protect Yourself From Stalkers And Stay Safe In The... The Successful Privacy Mindset - Proven Security Hacks And Tricks To Protect Yourself From Stalkers And Stay Safe In The Digital Age...Guaranteed! (Paperback)
Jack Norton
R354 Discovery Miles 3 540 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R594 R547 Discovery Miles 5 470
Permanent Record
Edward Snowden Paperback R299 R270 Discovery Miles 2 700
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R347 Discovery Miles 3 470
Information And Communications…
Dana van der Merwe Paperback R1,257 R1,119 Discovery Miles 11 190
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,237 Discovery Miles 32 370
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,864 Discovery Miles 68 640
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,399 Discovery Miles 23 990
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R3,090 Discovery Miles 30 900
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R10,749 Discovery Miles 107 490
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R8,343 Discovery Miles 83 430

 

Partners