0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (223)
  • R500+ (768)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Don't You Dare Forget Me! - Discreet Internet Password Keeper - Store Websites, Usernames, Passwords - Funny Gift... Don't You Dare Forget Me! - Discreet Internet Password Keeper - Store Websites, Usernames, Passwords - Funny Gift Kitten/Cat Lovers (Paperback)
Cat & Dog Organizers
R216 Discovery Miles 2 160 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Black And White Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Black And White Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Red And White Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Red And White Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Your Safety and Privacy Online - The CIA and NSA (Paperback): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Paperback)
Siggi Bjarnason
R289 R274 Discovery Miles 2 740 Save R15 (5%) Ships in 18 - 22 working days
Happy 85th Birthday - 85 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a... Happy 85th Birthday - 85 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Gray Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Gray Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - navy blue Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - navy blue Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Pink Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Pink Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Orange Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Orange Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
scam.con (Paperback): Tom Law scam.con (Paperback)
Tom Law
R865 Discovery Miles 8 650 Ships in 18 - 22 working days
Information Security Handbook (Hardcover): Conner Casini Information Security Handbook (Hardcover)
Conner Casini
R3,076 R2,788 Discovery Miles 27 880 Save R288 (9%) Ships in 18 - 22 working days
Microsoft System Center Data Protection Manager Cookbook - Maximize storage efficiency, performance, and security using System... Microsoft System Center Data Protection Manager Cookbook - Maximize storage efficiency, performance, and security using System Center LTSC and SAC releases (Paperback)
Charbel Nemnom, Patrick Lownds
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPM Key Features Adapt to the modern data center design challenges and improve storage efficiency Effective recipes to help you create your own robust architectural designs Solve data protection and recovery problems in your organization Book DescriptionSystem Center Data Protection Manager (SCDPM) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the backup and recovery of enterprise data. With an increase in data recovery and protection problems faced in organizations, it has become important to keep data safe and recoverable. This book contains recipes that will help you upgrade to SCDPM and it covers the advanced features and functionality of SCDPM. This book starts by helping you install SCDPM and then moves on to post-installation and management tasks. You will come across a lot of useful recipes that will help you recover your VMware and Hyper-V VMs. It will also walk you through tips for monitoring SCDPM in different scenarios. Next, the book will also offer insights into protecting windows workloads followed by best practices on SCDPM. You will also learn to back up your Azure Stack Infrastructure using Azure Backup. You will also learn about recovering data from backup and implementing disaster recovery. Finally, the book will show you how to configure the protection groups to enable online protection and troubleshoot Microsoft Azure Backup Agent. What you will learn Install and prepare SQL Server for the SCDPM database Reduce backup storage with SCDPM and data deduplication Learn about the prerequisites for supported Hyper-V Server protection Integrate SCDPM with other System Center products to build optimal services Protect and restore the SCDPM database Protect your data center by integrating SCDPM with Azure Backup Manually create online recovery points and recover production data from Azure Protect and learn about the requirements to recover Azure Stack with SCDPM Who this book is forIf you are an SCDPM administrator, this book will help you verify your knowledge and provide you with everything you need to know about the new release of System Center Data Protection Manager.

SQL & NoSQL Databases - Models, Languages, Consistency Options and Architectures for Big Data Management (Paperback, 1st ed.... SQL & NoSQL Databases - Models, Languages, Consistency Options and Architectures for Big Data Management (Paperback, 1st ed. 2019)
Andreas Meier, Michael Kaufmann
R1,203 Discovery Miles 12 030 Ships in 9 - 17 working days

This book offers a comprehensive introduction to relational (SQL) and non-relational (NoSQL) databases. The authors thoroughly review the current state of database tools and techniques, and examine coming innovations. The book opens with a broad look at data management, including an overview of information systems and databases, and an explanation of contemporary database types: SQL and NoSQL databases, and their respective management systems The nature and uses of Big Data A high-level view of the organization of data management Data Modeling and Consistency Chapter-length treatment is afforded Data Modeling in both relational and graph databases, including enterprise-wide data architecture, and formulas for database design. Coverage of languages extends from an overview of operators, to SQL and and QBE (Query by Example), to integrity constraints and more. A full chapter probes the challenges of Ensuring Data Consistency, covering: Multi-User Operation Troubleshooting Consistency in Massive Distributed Data Comparison of the ACID and BASE consistency models, and more System Architecture also gets from its own chapter, which explores Processing of Homogeneous and Heterogeneous Data; Storage and Access Structures; Multi-dimensional Data Structures and Parallel Processing with MapReduce, among other topics. Post-Relational and NoSQL Databases The chapter on post-relational databases discusses the limits of SQL - and what lies beyond, including Multi-Dimensional Databases, Knowledge Bases and and Fuzzy Databases. A final chapter covers NoSQL Databases, along with Development of Non-Relational Technologies, Key-Value, Column-Family and Document Stores XML Databases and Graphic Databases, and more The book includes more than 100 tables, examples and illustrations, and each chapter offers a list of resources for further reading. SQL & NoSQL Databases conveys the strengths and weaknesses of relational and non-relational approaches, and shows how to undertake development for big data applications. The book benefits readers including students and practitioners working across the broad field of applied information technology. This textbook has been recommended and developed for university courses in Germany, Austria and Switzerland.

Shit! I forgot my password again! - Internet security password with 312 sections for internet passwords for addresses and... Shit! I forgot my password again! - Internet security password with 312 sections for internet passwords for addresses and usernames, humorous cover A-Z index (Paperback)
Kay D Johnson
R252 Discovery Miles 2 520 Ships in 18 - 22 working days
Password Slut - Internet security password with 312 sections for internet passwords for addresses and usernames, humorous cover... Password Slut - Internet security password with 312 sections for internet passwords for addresses and usernames, humorous cover A-Z index (Paperback)
Kay D Johnson
R252 Discovery Miles 2 520 Ships in 18 - 22 working days
Tor Bible (Paperback): Arlen Kraham Tor Bible (Paperback)
Arlen Kraham
R940 Discovery Miles 9 400 Ships in 18 - 22 working days
Hands-On Ethical Hacking and Network Defense (Paperback, 3rd edition): Nicholas Antill, Michael Simpson Hands-On Ethical Hacking and Network Defense (Paperback, 3rd edition)
Nicholas Antill, Michael Simpson
R1,320 R1,223 Discovery Miles 12 230 Save R97 (7%) Ships in 10 - 15 working days

Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.

The Cyber Path - The Infrastructure Supporting the Internet Data Flow (Paperback): Lou Giannelli The Cyber Path - The Infrastructure Supporting the Internet Data Flow (Paperback)
Lou Giannelli
R467 R439 Discovery Miles 4 390 Save R28 (6%) Ships in 18 - 22 working days
Book of Elusive Passwords - Internet security password with 312 sections for internet passwords for addresses and usernames,... Book of Elusive Passwords - Internet security password with 312 sections for internet passwords for addresses and usernames, humorous cover A-Z index (Paperback)
Kay D Johnson
R252 Discovery Miles 2 520 Ships in 18 - 22 working days
Internet Password Logbook - Black Password organizer to Keep Usernames, Passwords, Web Addresses & More. Alphabetical Tabs for... Internet Password Logbook - Black Password organizer to Keep Usernames, Passwords, Web Addresses & More. Alphabetical Tabs for Quick Easy Access (Paperback)
Practical Blank Journals
R183 Discovery Miles 1 830 Ships in 18 - 22 working days
An Essential Guide to Cybersecurity - What You Need to Know (Paperback): Veronica Miller An Essential Guide to Cybersecurity - What You Need to Know (Paperback)
Veronica Miller; David Miller
R346 Discovery Miles 3 460 Ships in 18 - 22 working days
Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Paperback): Sunita Vikrant Dhavale Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Paperback)
Sunita Vikrant Dhavale
R4,151 Discovery Miles 41 510 Ships in 18 - 22 working days

In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.

Hands-On Dark Web Analysis - Learn what goes on in the Dark Web, and how to work with it (Paperback): Sion Retzkin Hands-On Dark Web Analysis - Learn what goes on in the Dark Web, and how to work with it (Paperback)
Sion Retzkin
R818 Discovery Miles 8 180 Ships in 18 - 22 working days

Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features Understand the concept of Dark Net and Deep Web Use Tor to extract data and maintain anonymity Develop a security framework using Deep web evidences Book DescriptionThe overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis What you will learn Access the Deep Web and the Dark Web Learn to search and find information in the Dark Web Protect yourself while browsing the Dark Web Understand what the Deep Web and Dark Web are Learn what information you can gather, and how Who this book is forThis book is targeted towards security professionals, security analyst, or any stakeholder interested in learning the concept of deep web and dark net. No prior knowledge on Deep Web and Dark Net is required

Simple Internet Safety - The Knowledge You Need to Avoid Being Scammed (Paperback): Michael Paulhus Simple Internet Safety - The Knowledge You Need to Avoid Being Scammed (Paperback)
Michael Paulhus
R464 Discovery Miles 4 640 Ships in 18 - 22 working days
Throughput Accounting in a Hyperconnected World (Paperback): Ionica Oncioiu Throughput Accounting in a Hyperconnected World (Paperback)
Ionica Oncioiu
R3,790 Discovery Miles 37 900 Ships in 18 - 22 working days

As economies globalize, the number and power of transnational companies increases, especially in developing countries. Relevant, reliable, and comparable financial information and a common business language are needed to ensure communication between all users of financial information. Throughput Accounting in a Hyperconnected World provides innovative insights into controversial debates regarding the configuration and use of accounting and finance information both internally within economic entities and through third parties. These debates underline the major responsibility of users when configuring accounting and finance models and thereby in modelling business information. The content within this publication covers risk analysis, social accounting, and entrepreneurial models and is designed for managers, accountants, risk managers, academics, researchers, practitioners, and students.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R762 Discovery Miles 7 620
You: For Sale - Protecting Your Personal…
Stuart Sumner Paperback R853 Discovery Miles 8 530
Intelligent Data Analysis for e-Learning…
Jorge Miguel, Santi Caballe, … Paperback R2,520 R2,325 Discovery Miles 23 250
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R349 Discovery Miles 3 490
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,311 Discovery Miles 73 110
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R578 Discovery Miles 5 780
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,137 Discovery Miles 71 370
Modern Day Surveillance Ecosystem and…
Ananda Mitra Hardcover R5,333 Discovery Miles 53 330
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,416 Discovery Miles 94 160
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970

 

Partners