0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (223)
  • R500+ (771)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and... I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and Services - With Tabs (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Cross Site Scripting - XSS Defense Made Easy (Paperback): Harvey Berman Cross Site Scripting - XSS Defense Made Easy (Paperback)
Harvey Berman
R386 Discovery Miles 3 860 Ships in 18 - 22 working days
You Can't Afford to Get Hacked - The must-have practical guide to keeping your household safe online (Paperback): Amir... You Can't Afford to Get Hacked - The must-have practical guide to keeping your household safe online (Paperback)
Amir Roknifard, Amjad Pirotti
R373 Discovery Miles 3 730 Ships in 18 - 22 working days
Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - Anchor Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Size (6 x 9 inches) - 100 Pages - Anchor Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and... Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback)
Ethan Thorpe
R499 Discovery Miles 4 990 Ships in 18 - 22 working days
Oops! I Forgot Password (Paperback): Dorothy J Hall Oops! I Forgot Password (Paperback)
Dorothy J Hall
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
What is the Dark Web? - The truth about the hidden part of the internet (Paperback): Evan J Rodgers What is the Dark Web? - The truth about the hidden part of the internet (Paperback)
Evan J Rodgers
R323 Discovery Miles 3 230 Ships in 18 - 22 working days
Cybercon - Protecting Ourselves from Big Tech & Bigger Lies (Paperback): James L Norrie Cybercon - Protecting Ourselves from Big Tech & Bigger Lies (Paperback)
James L Norrie
R457 Discovery Miles 4 570 Ships in 18 - 22 working days
I'm Dead, But My Password Is Not (Paperback): Josh K Howard I'm Dead, But My Password Is Not (Paperback)
Josh K Howard
R267 Discovery Miles 2 670 Ships in 18 - 22 working days
Protecting the Integrity of Internet Routing - Border Gateway Protocol (BGP) Route Origin Validation: NIST SP 1800-14A, B & C... Protecting the Integrity of Internet Routing - Border Gateway Protocol (BGP) Route Origin Validation: NIST SP 1800-14A, B & C (Paperback)
National Institute of Standards and Tech
R707 Discovery Miles 7 070 Ships in 18 - 22 working days
Location Privacy in Mobile Applications (Paperback, 1st ed. 2018): Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang Location Privacy in Mobile Applications (Paperback, 1st ed. 2018)
Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Your Safety and Privacy Online - The CIA and NSA (Paperback): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Paperback)
Siggi Bjarnason
R289 R274 Discovery Miles 2 740 Save R15 (5%) Ships in 18 - 22 working days
Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R312 R289 Discovery Miles 2 890 Save R23 (7%) Ships in 18 - 22 working days
The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives... The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives (Paperback)
Larry Bell
R358 R339 Discovery Miles 3 390 Save R19 (5%) Ships in 18 - 22 working days
Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and... Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation (Paperback)
Derek Drake, Instafo
R249 Discovery Miles 2 490 Ships in 18 - 22 working days
Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events... Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Eric C. Thompson
R1,195 R998 Discovery Miles 9 980 Save R197 (16%) Ships in 18 - 22 working days

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan-which author Eric Thompson provides in this book. What You Will Learn Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback): David Tracey The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback)
David Tracey
R339 Discovery Miles 3 390 Ships in 18 - 22 working days
Password Book - Include Alphabetical Index With Black Seamless Floral Pattern (Paperback): Shamrock Logbook Password Book - Include Alphabetical Index With Black Seamless Floral Pattern (Paperback)
Shamrock Logbook
R197 Discovery Miles 1 970 Ships in 18 - 22 working days
The Language of Cybersecurity (Paperback): Maria Antonieta Flores The Language of Cybersecurity (Paperback)
Maria Antonieta Flores
R643 Discovery Miles 6 430 Ships in 18 - 22 working days
Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback)
Harris Schwartz
R546 Discovery Miles 5 460 Ships in 18 - 22 working days
I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback): Fletcher Press I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback)
Fletcher Press
R179 Discovery Miles 1 790 Ships in 18 - 22 working days
Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,204 Discovery Miles 12 040 Ships in 18 - 22 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R445 R414 Discovery Miles 4 140 Save R31 (7%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Brockton Tragedy at Moosehead Lake
James E. Benson, Nicole B Casper Paperback R492 R458 Discovery Miles 4 580
Memory Against Forgetting - A…
Ranjith Kally Hardcover R450 R109 Discovery Miles 1 090
Nolensville
Beth Lothers, Vicky Travis Paperback R561 R515 Discovery Miles 5 150
A History of Nebraska Agriculture: A…
Jody L Lamp Paperback R605 R559 Discovery Miles 5 590
Historic Adventures on the Colorado…
Robert Silbernagel Paperback R517 R486 Discovery Miles 4 860
South Africa - A Photographic…
Sean Fraser Paperback R400 R369 Discovery Miles 3 690
Rihanna
Rihanna Hardcover  (1)
R4,035 R3,076 Discovery Miles 30 760
Wicked Vermont
Thea Lewis Paperback R505 R473 Discovery Miles 4 730
Ghosts of the Last Best Place
Ellen Baumler Paperback R496 R463 Discovery Miles 4 630
Fire Lookouts of Oregon
Cheryl Hill Paperback R561 R515 Discovery Miles 5 150

 

Partners