0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (119)
  • R250 - R500 (219)
  • R500+ (776)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Throughput Accounting in a Hyperconnected World (Paperback): Ionica Oncioiu Throughput Accounting in a Hyperconnected World (Paperback)
Ionica Oncioiu
R3,790 Discovery Miles 37 900 Ships in 18 - 22 working days

As economies globalize, the number and power of transnational companies increases, especially in developing countries. Relevant, reliable, and comparable financial information and a common business language are needed to ensure communication between all users of financial information. Throughput Accounting in a Hyperconnected World provides innovative insights into controversial debates regarding the configuration and use of accounting and finance information both internally within economic entities and through third parties. These debates underline the major responsibility of users when configuring accounting and finance models and thereby in modelling business information. The content within this publication covers risk analysis, social accounting, and entrepreneurial models and is designed for managers, accountants, risk managers, academics, researchers, practitioners, and students.

Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback): Codaspy Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback)
Codaspy
R2,789 Discovery Miles 27 890 Ships in 18 - 22 working days
Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores... Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores (Paperback)
Josh Ochs
R232 Discovery Miles 2 320 Ships in 18 - 22 working days
Cyber Security for Seniors (Paperback): Steve Krantz Cyber Security for Seniors (Paperback)
Steve Krantz
R495 Discovery Miles 4 950 Out of stock
Password Keeper - Save Passwords - Wi-Fi Log-Ins - Software Licenses (Paperback): Simple Start Guides Password Keeper - Save Passwords - Wi-Fi Log-Ins - Software Licenses (Paperback)
Simple Start Guides
R250 Discovery Miles 2 500 Ships in 18 - 22 working days
Audio Content Security - Attack Analysis on Audio Watermarking (Paperback): Sogand Ghorbani, I.S. Dr. Amiri Audio Content Security - Attack Analysis on Audio Watermarking (Paperback)
Sogand Ghorbani, I.S. Dr. Amiri
R1,373 Discovery Miles 13 730 Out of stock

Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.

Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback): Adrian Pruteanu Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback)
Adrian Pruteanu
R1,098 Discovery Miles 10 980 Ships in 18 - 22 working days

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book DescriptionBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is forThe reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover): Bryce Austin Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover)
Bryce Austin
R968 Discovery Miles 9 680 Ships in 18 - 22 working days
The Expanding Cyber Threat (Paperback): Subcommittee on Research and Technology The Expanding Cyber Threat (Paperback)
Subcommittee on Research and Technology
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
The Human Firewall - Cybersecurity is not just an IT problem (Paperback): Rob May The Human Firewall - Cybersecurity is not just an IT problem (Paperback)
Rob May
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback): Infrastru Subcommittee on... Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback)
Infrastru Subcommittee on Cybersecurity
R396 Discovery Miles 3 960 Ships in 18 - 22 working days
Examining the President's Cybersecurity Information-Sharing Proposal (Paperback): Committee on Homeland Security House of Examining the President's Cybersecurity Information-Sharing Proposal (Paperback)
Committee on Homeland Security House of
R397 Discovery Miles 3 970 Ships in 18 - 22 working days
Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment,... Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare (Paperback)
Lester Evans
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Location Privacy in Mobile Applications (Paperback, 1st ed. 2018): Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang Location Privacy in Mobile Applications (Paperback, 1st ed. 2018)
Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback):... Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback)
Jay Schulman
R179 Discovery Miles 1 790 Ships in 18 - 22 working days
Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element... Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element Of The Threat Within Your Business In Seven Successful Practices (Paperback)
Boaz Fischer
R527 Discovery Miles 5 270 Ships in 18 - 22 working days
Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback): Dr. Erdal Ozkaya Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback)
Dr. Erdal Ozkaya
R1,166 Discovery Miles 11 660 Ships in 18 - 22 working days

Improve information security by learning Social Engineering. Key Features Learn to implement information security using social engineering Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on Practical approach towards learning social engineering, for IT security Book DescriptionThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts. What you will learn Learn to implement information security using social engineering Learn social engineering for IT security Understand the role of social media in social engineering Get acquainted with Practical Human hacking skills Learn to think like a social engineer Learn to beat a social engineer Who this book is forThis book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback): Dr S Sai Satyanarayana Reddy, Dr Ramesh... Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback)
Dr S Sai Satyanarayana Reddy, Dr Ramesh Shahabadkar
R280 Discovery Miles 2 800 Ships in 18 - 22 working days
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive... Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive Analytics and Data Science with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R521 Discovery Miles 5 210 Ships in 18 - 22 working days
Protect Your Online Identity Like Your Virginity (Paperback): Abhishek Singh Rajpurohit Protect Your Online Identity Like Your Virginity (Paperback)
Abhishek Singh Rajpurohit
R447 Discovery Miles 4 470 Ships in 18 - 22 working days
Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security... Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security flaws (Paperback)
Joseph Marshall
R1,052 Discovery Miles 10 520 Ships in 18 - 22 working days

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.

Cyber Ethics 4.0 - Serving Humanity with Values (Paperback): Christoph Stuckelberger, Pavan Duggal Cyber Ethics 4.0 - Serving Humanity with Values (Paperback)
Christoph Stuckelberger, Pavan Duggal
R792 Discovery Miles 7 920 Ships in 18 - 22 working days
Hacking - The Complete Beginner's Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems,... Hacking - The Complete Beginner's Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems, Information Gathering, Password Cracking, System Entry & Wireless Hacking (Paperback)
Jack Jones
R617 Discovery Miles 6 170 Ships in 18 - 22 working days
PAM Mastery (Paperback): Michael W Lucas PAM Mastery (Paperback)
Michael W Lucas
R531 Discovery Miles 5 310 Ships in 18 - 22 working days
C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking... C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R538 Discovery Miles 5 380 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Basics of Digital Privacy - Simple…
Denny Cherry Paperback R616 Discovery Miles 6 160
On Thin Ice
Leading Cybersecurity Experts Hardcover R680 Discovery Miles 6 800
A Corporate Librarian's Guide to…
Phyllis L. Elin Paperback R604 R548 Discovery Miles 5 480
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,137 Discovery Miles 71 370
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R578 Discovery Miles 5 780
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R762 Discovery Miles 7 620
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
Information And Communications…
Dana van der Merwe Paperback R1,320 R1,149 Discovery Miles 11 490
Handbook of Research on Intelligent Data…
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi Hardcover R9,365 Discovery Miles 93 650
Permanent Record
Edward Snowden Paperback R299 R271 Discovery Miles 2 710

 

Partners