0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (224)
  • R500+ (767)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives... The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives (Paperback)
Larry Bell
R358 R339 Discovery Miles 3 390 Save R19 (5%) Ships in 18 - 22 working days
Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and... Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation (Paperback)
Derek Drake, Instafo
R249 Discovery Miles 2 490 Ships in 18 - 22 working days
Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events... Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Eric C. Thompson
R1,195 R998 Discovery Miles 9 980 Save R197 (16%) Ships in 18 - 22 working days

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan-which author Eric Thompson provides in this book. What You Will Learn Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback): David Tracey The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback)
David Tracey
R339 Discovery Miles 3 390 Ships in 18 - 22 working days
Password Book - Include Alphabetical Index With Black Seamless Floral Pattern (Paperback): Shamrock Logbook Password Book - Include Alphabetical Index With Black Seamless Floral Pattern (Paperback)
Shamrock Logbook
R197 Discovery Miles 1 970 Ships in 18 - 22 working days
The Language of Cybersecurity (Paperback): Maria Antonieta Flores The Language of Cybersecurity (Paperback)
Maria Antonieta Flores
R643 Discovery Miles 6 430 Ships in 18 - 22 working days
Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback)
Harris Schwartz
R546 Discovery Miles 5 460 Ships in 18 - 22 working days
I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback): Fletcher Press I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback)
Fletcher Press
R179 Discovery Miles 1 790 Ships in 18 - 22 working days
Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,204 Discovery Miles 12 040 Ships in 18 - 22 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R445 R414 Discovery Miles 4 140 Save R31 (7%) Ships in 18 - 22 working days
Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R311 R288 Discovery Miles 2 880 Save R23 (7%) Ships in 18 - 22 working days
Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback): Asiaccs Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback)
Asiaccs
R5,923 Discovery Miles 59 230 Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- White (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- White (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
All the Shit I Can't Remember - Password Keeper and Finder Notebook w/ White & Green Paint on House Wall Texture Design... All the Shit I Can't Remember - Password Keeper and Finder Notebook w/ White & Green Paint on House Wall Texture Design Gift (Paperback)
The Yellow Brush
R283 Discovery Miles 2 830 Ships in 18 - 22 working days
Building an Effective Cybersecurity Program (Paperback, 2nd ed.): Tari Schreider Building an Effective Cybersecurity Program (Paperback, 2nd ed.)
Tari Schreider
R2,061 Discovery Miles 20 610 Ships in 18 - 22 working days
Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd... Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Gerard Johansen
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

The Secure CiO - How to Hire and Retain Great Cyber Security Talent to Protect your Organisation (Paperback): Claire Pales The Secure CiO - How to Hire and Retain Great Cyber Security Talent to Protect your Organisation (Paperback)
Claire Pales
R474 Discovery Miles 4 740 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location Gray And White Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location Gray And White Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Personal Password Keeper - Keep your usernames, passwords, social info, web addresses and security questions in one. So easy &... Personal Password Keeper - Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R333 Discovery Miles 3 330 Ships in 18 - 22 working days
I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design... I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Purple (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Purple (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R331 R312 Discovery Miles 3 120 Save R19 (6%) Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Black (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Black (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
Password Log (Paperback): My Password Log Password Log (Paperback)
My Password Log
R347 Discovery Miles 3 470 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
JIMMIE G. - The extraordinary life and…
Paul W Guthrie Hardcover R1,488 Discovery Miles 14 880
Entity Resolution and Information…
John R. Talburt Paperback R1,103 Discovery Miles 11 030
Tower Baby - Waterproof Day Care Labels…
R63 R51 Discovery Miles 510
Thamar Karsavina
Valerien Svetlov Hardcover R920 Discovery Miles 9 200
Tower C10 Round Col. Code Labels - Red…
R31 R25 Discovery Miles 250
My Three Wishes - Memoir of a Hawaiian…
Kanoe Kaye Hardcover R784 Discovery Miles 7 840
Emerging Technologies and Circuits
Amara Amara, Thomas Ea, … Hardcover R4,156 Discovery Miles 41 560
Tower C19 Round Col. Code Labels - Red…
R31 R25 Discovery Miles 250
Vulnerable Workers - Health, Safety and…
Malcolm Sargeant Paperback R1,673 Discovery Miles 16 730
Tower C19 Round Col. Code Labels…
R31 R25 Discovery Miles 250

 

Partners