0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (126)
  • R250 - R500 (242)
  • R500+ (796)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Throughput Accounting in a Hyperconnected World (Paperback): Ionica Oncioiu Throughput Accounting in a Hyperconnected World (Paperback)
Ionica Oncioiu
R3,790 Discovery Miles 37 900 Ships in 18 - 22 working days

As economies globalize, the number and power of transnational companies increases, especially in developing countries. Relevant, reliable, and comparable financial information and a common business language are needed to ensure communication between all users of financial information. Throughput Accounting in a Hyperconnected World provides innovative insights into controversial debates regarding the configuration and use of accounting and finance information both internally within economic entities and through third parties. These debates underline the major responsibility of users when configuring accounting and finance models and thereby in modelling business information. The content within this publication covers risk analysis, social accounting, and entrepreneurial models and is designed for managers, accountants, risk managers, academics, researchers, practitioners, and students.

Happy 37th Birthday Shithead - Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large print,... Happy 37th Birthday Shithead - Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large print, Paperback, Large type / large print edition)
Karlon Douglas; Level Up Designs, Karlon Douglas
R214 Discovery Miles 2 140 Ships in 18 - 22 working days
Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores... Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores (Paperback)
Josh Ochs
R232 Discovery Miles 2 320 Ships in 18 - 22 working days
Cyber Security for Seniors (Paperback): Steve Krantz Cyber Security for Seniors (Paperback)
Steve Krantz
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
Cybersecurity - What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An... Cybersecurity - What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners (Paperback)
Lester Evans
R415 Discovery Miles 4 150 Ships in 18 - 22 working days
Cybersecurity Primer (Paperback): Victor M. Font Jr Cybersecurity Primer (Paperback)
Victor M. Font Jr
R425 R390 Discovery Miles 3 900 Save R35 (8%) Ships in 18 - 22 working days
Password Keeper - Save Passwords - Wi-Fi Log-Ins - Software Licenses (Paperback): Simple Start Guides Password Keeper - Save Passwords - Wi-Fi Log-Ins - Software Licenses (Paperback)
Simple Start Guides
R250 Discovery Miles 2 500 Ships in 18 - 22 working days
How to Talk to Your Kids About Pornography (Paperback): Educate and Empower Kids, Dina Alexander How to Talk to Your Kids About Pornography (Paperback)
Educate and Empower Kids, Dina Alexander; Illustrated by Jera Mehrdad
R358 R332 Discovery Miles 3 320 Save R26 (7%) Ships in 18 - 22 working days
Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in... Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in Windows Server 2016 (Paperback)
Jordan Krause
R792 Discovery Miles 7 920 Ships in 18 - 22 working days

This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Book Description Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further. You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers. Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network. When we say "networking" we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting these assets securely back into the corporate network, with information about DirectAccess and VPN. The material in the book has been selected from the content of Packt's Windows Server 2016 Cookbook by Jordan Krause to provide a specific focus on these key Windows Server tasks. What you will learn Implement solid networking and security practices into your Windows Server environment Design your own PKI and start issuing certificates today Connect your remote laptops back to the corporate network using Microsoft's own remote access technologies, including DirectAccess Learn to use commands that will help you with monitoring network traffic. Build and explore your first Server Core instance today! Who this book is forIf you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. If you are a server administrator setting up certificate services for the first time you will also benefit from the step-by-step instructions on implementation of a PKI.

C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking... C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R538 Discovery Miles 5 380 Ships in 18 - 22 working days
The Human Firewall - Cybersecurity is not just an IT problem (Paperback): Rob May The Human Firewall - Cybersecurity is not just an IT problem (Paperback)
Rob May
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
The Expanding Cyber Threat (Paperback): Subcommittee on Research and Technology The Expanding Cyber Threat (Paperback)
Subcommittee on Research and Technology
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
Examining the President's Cybersecurity Information-Sharing Proposal (Paperback): Committee on Homeland Security House of Examining the President's Cybersecurity Information-Sharing Proposal (Paperback)
Committee on Homeland Security House of
R397 Discovery Miles 3 970 Ships in 18 - 22 working days
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback): Infrastru Subcommittee on... Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback)
Infrastru Subcommittee on Cybersecurity
R396 Discovery Miles 3 960 Ships in 18 - 22 working days
Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment,... Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare (Paperback)
Lester Evans
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Zero Botnets - Building a Global Effort to Clean Up the Internet (Paperback): Jason Healey, Robert K. Knake Zero Botnets - Building a Global Effort to Clean Up the Internet (Paperback)
Jason Healey, Robert K. Knake
R407 Discovery Miles 4 070 Ships in 18 - 22 working days
Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback):... Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback)
Jay Schulman
R179 Discovery Miles 1 790 Ships in 18 - 22 working days
Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback): Dr. Erdal Ozkaya Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback)
Dr. Erdal Ozkaya
R1,166 Discovery Miles 11 660 Ships in 18 - 22 working days

Improve information security by learning Social Engineering. Key Features Learn to implement information security using social engineering Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on Practical approach towards learning social engineering, for IT security Book DescriptionThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts. What you will learn Learn to implement information security using social engineering Learn social engineering for IT security Understand the role of social media in social engineering Get acquainted with Practical Human hacking skills Learn to think like a social engineer Learn to beat a social engineer Who this book is forThis book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element... Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element Of The Threat Within Your Business In Seven Successful Practices (Paperback)
Boaz Fischer
R527 Discovery Miles 5 270 Ships in 18 - 22 working days
Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback): Codaspy Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback)
Codaspy
R2,789 Discovery Miles 27 890 Ships in 18 - 22 working days
Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security... Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security flaws (Paperback)
Joseph Marshall
R1,052 Discovery Miles 10 520 Ships in 18 - 22 working days

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.

Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback): Dr S Sai Satyanarayana Reddy, Dr Ramesh... Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback)
Dr S Sai Satyanarayana Reddy, Dr Ramesh Shahabadkar
R280 Discovery Miles 2 800 Ships in 18 - 22 working days
PAM Mastery (Paperback): Michael W Lucas PAM Mastery (Paperback)
Michael W Lucas
R531 Discovery Miles 5 310 Ships in 18 - 22 working days
The Personal Internet and Password Log (Paperback): Gary Wittmann The Personal Internet and Password Log (Paperback)
Gary Wittmann
R180 Discovery Miles 1 800 Ships in 18 - 22 working days
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive... Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive Analytics and Data Science with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R521 Discovery Miles 5 210 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Liquid Chromatography of Natural…
Tibor Cserhati Hardcover R7,846 Discovery Miles 78 460
Mains Hum..Mains Hum Go Away! - Body…
E Ghonemi, M Sitohy Paperback R327 Discovery Miles 3 270
Early Scientific Computing in Britain
Mary Croarken Hardcover R1,326 Discovery Miles 13 260
Kister's Atlas Buying Guide - General…
Kenneth F. Kisters Hardcover R1,283 Discovery Miles 12 830
Some Account of the English Stage - from…
John Genest Paperback R749 Discovery Miles 7 490
Paula Deen & Friends - Living It Up…
Paula H Deen Paperback R430 Discovery Miles 4 300
Acts Of Transgression - Contemporary…
Jay Pather, Catherine Boulle Paperback R460 R425 Discovery Miles 4 250
Easy Cheese Boards - Arrangements…
Claire Robin Adler Paperback R305 Discovery Miles 3 050
Plekname van Suider-Afrika
Peter E. Raper, Lucie A. Moeller, … Hardcover R821 Discovery Miles 8 210
The Yugoslav Auschwitz and the Vatican…
Vladimir Dedijer Hardcover R1,252 R991 Discovery Miles 9 910

 

Partners