0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (223)
  • R500+ (768)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback): Ken Cureton, Steve Levinson Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback)
Ken Cureton, Steve Levinson; Richard Lowe
R391 Discovery Miles 3 910 Ships in 18 - 22 working days
Your Privacy & Security (Paperback): John Minges Your Privacy & Security (Paperback)
John Minges
R332 Discovery Miles 3 320 Ships in 18 - 22 working days
Big Book of Spyware (Paperback): Pierre Zollo Big Book of Spyware (Paperback)
Pierre Zollo
R899 Discovery Miles 8 990 Ships in 18 - 22 working days
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (Paperback):... Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) (Paperback)
Steven Furnell, Nathan Clarke
R565 Discovery Miles 5 650 Ships in 18 - 22 working days
Web Security Exploits (Paperback): Bryant Wan, Nicholas Dworak, Elden Federgreen Web Security Exploits (Paperback)
Bryant Wan, Nicholas Dworak, Elden Federgreen
R873 Discovery Miles 8 730 Ships in 18 - 22 working days
Commercial Cyber Espionage and Barriers to Digital Trade in China (Paperback): U S -China Economic and Security Review Commercial Cyber Espionage and Barriers to Digital Trade in China (Paperback)
U S -China Economic and Security Review
R460 Discovery Miles 4 600 Ships in 18 - 22 working days
Privacy in the Digital Age - Preventing Data Breaches and Combating Cyber Crime (Paperback): Committee on the Judiciary United... Privacy in the Digital Age - Preventing Data Breaches and Combating Cyber Crime (Paperback)
Committee on the Judiciary United States
R591 Discovery Miles 5 910 Ships in 18 - 22 working days
Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional... Hacking for Beginners - Learn How to Hack! a Complete Beginners Guide to Hacking! Learn the Secrets That the Professional Hackers Are Using Today! (Paperback)
Kevin Donaldson 1
R268 Discovery Miles 2 680 Ships in 18 - 22 working days
Secret Password Journal (Paperback): Speedy Publishing LLC Secret Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Website Address Book (Paperback): Speedy Publishing LLC Website Address Book (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Password Journal and Website Keeper (Paperback): Speedy Publishing LLC Password Journal and Website Keeper (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Tackling the SPAM Menace (Paperback): John Davidson Tackling the SPAM Menace (Paperback)
John Davidson; Edited by Mendon Cottage Books; Dueep Jyot Singh
R175 Discovery Miles 1 750 Ships in 18 - 22 working days
My Password Journal (Paperback): Speedy Publishing LLC My Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Password Keeper (Paperback): Speedy Publishing LLC Password Keeper (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Password Journal (Paperback): Speedy Publishing LLC Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Cybersecurity - Setting the Rules for Responsible Global Cyber Behavior (Paperback): The Pacific Subcommittee on East Asia Cybersecurity - Setting the Rules for Responsible Global Cyber Behavior (Paperback)
The Pacific Subcommittee on East Asia
R419 Discovery Miles 4 190 Ships in 18 - 22 working days
Memory Dump Analysis Anthology, Volume 8B (Paperback): Dmitry Vostokov, Software Diagnostics Institute Memory Dump Analysis Anthology, Volume 8B (Paperback)
Dmitry Vostokov, Software Diagnostics Institute
R1,044 Discovery Miles 10 440 Ships in 18 - 22 working days
Bit Wars - Cyber Crime, Hacking & Information Warfare (Paperback): Thomas S Hyslip Bit Wars - Cyber Crime, Hacking & Information Warfare (Paperback)
Thomas S Hyslip
R156 Discovery Miles 1 560 Ships in 18 - 22 working days
Boys Password Journal (Paperback): Speedy Publishing LLC Boys Password Journal (Paperback)
Speedy Publishing LLC
R348 R321 Discovery Miles 3 210 Save R27 (8%) Ships in 18 - 22 working days
Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day - Simple Steps to Help You Create Better Security Habits... Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day - Simple Steps to Help You Create Better Security Habits to Reduce the Risk of Becoming a Cyber Victim (Paperback)
Boaz Fischer
R1,776 Discovery Miles 17 760 Ships in 18 - 22 working days
What Happens on Campus Stays on YouTube - The NEW rules for your reputation on campus, online, and beyond. (Paperback): Paul... What Happens on Campus Stays on YouTube - The NEW rules for your reputation on campus, online, and beyond. (Paperback)
Paul Gordon Brown, Jason L Meriwether, Courtney O'Connell
R427 Discovery Miles 4 270 Ships in 18 - 22 working days
Surviving The Zombie Apocalypse - Safer Computing Tips for Small Business Managers and Everyday People (Paperback): Max Nomad Surviving The Zombie Apocalypse - Safer Computing Tips for Small Business Managers and Everyday People (Paperback)
Max Nomad
R699 R629 Discovery Miles 6 290 Save R70 (10%) Ships in 18 - 22 working days
Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover): Larry A Schwartz Consumer Privacy in the 21st Century - Best Practices for Businesses & Policymakers (Hardcover)
Larry A Schwartz
R3,655 Discovery Miles 36 550 Ships in 10 - 15 working days

In today's world of smart phones, smart grids, and smart cars, companies are collecting, storing, and sharing more information about consumers than ever before. Although companies use this information to innovate and deliver better products and services to consumers, they should not do so at the expense of consumer privacy. This book provides an overview for how companies can act now to implement best practices to protect consumers' private information. These best practices would include making privacy the "default setting" for commercial data practices and give consumers greater control over the collection and use of their personal data through simplified choices and increased transparency. Implementing these best practices will enhance trust and stimulate commerce.

Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview... Basic Politics of Movement Security - A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks (Paperback)
J Sakai, Mandy Hiscocks
R185 Discovery Miles 1 850 Ships in 18 - 22 working days

Here are two "live" discussions by radical activists introducing the issues of movement security: u.s. activist and author J. Sakai & long-time Canadian organizer Mandy Hiscocks.


There are many books and articles reporting state repression, but not on that subject's more intimate relative, movement security. It is general practice to only pass along knowledge about movement security privately, in closed group lectures or by personal word-of-mouth. In fact, when new activists have questions about security problems, they quickly discover that there is no "Security for Dummies" to explore the basics. Adding to the confusion, the handful of available left security texts are usually about underground or illegal groups, not the far larger public movements that work on a more or less legal level.


During Montreal's 2013 Festival of Anarchy, J. Sakai gave a workshop about the politics of movement security, sharing the results of typical incidents of both the movement's successes and the movement's failures in combating the "political police" or state security agencies. He also discussed the nature of those state sub-cultures. This booklet contains a transcript of that talk, and of the subsequent lively question and answer period; along with several after-the-workshop observations by Sakai.


As he explains, "The key thing is, to start with, security is not about being macho vigilantes or having techniques of this or that. It's not some spy game. Security is about good politics. That's exactly why it's so difficult. But everyone will say that they have good politics. So this has to be broken down, this has to be explained." Which is what he does in this unusual talk.


Mandy Hiscocks comes at the topic from her personal experiences organizing against the 2010 G20 Summit in Toronto. In this in-depth interview, Hiscocks describes how her political scene and groups she worked with were infiltrated by undercover agents over a year before the summit even occurred. These police infiltrators provided information used in the prosecution of anti-Globalization organizers and participants. Hiscocks provides an honest and sobering appraisal of the practical challenge of State infiltration, and of how subsequent decisions played out in regards to the anti-G20 organizing and the repression that resulted. Hiscocks spent a year in prison as a result of these experiences, shortly after this interview was conducted.


Corporate Cyberwar (Paperback): Dr Michael Teng Corporate Cyberwar (Paperback)
Dr Michael Teng
R474 Discovery Miles 4 740 Ships in 18 - 22 working days

Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Quality Management Principles and…
Neeta Baporikar, Michael Sony Hardcover R5,399 Discovery Miles 53 990
Guido Bonatti's Book of Astronomy Part I
William Tynan Hardcover R1,295 R1,099 Discovery Miles 10 990
The Complete Hitchhiker's Guide to the…
Douglas Adams Paperback R1,417 R1,149 Discovery Miles 11 490
Astrology for Witches - Enhance Your…
Michael Herkes Hardcover R594 R548 Discovery Miles 5 480
Moby-Dick - or, The Whale
Herman Melville Hardcover R1,044 Discovery Miles 10 440
What We Know About Grading - What Works…
Thomas R. Guskey, Susan M. Brookhart Paperback R811 R705 Discovery Miles 7 050
Awakening Astrology - Five Key Planetary…
Molly McCord Paperback R564 R518 Discovery Miles 5 180
The Horary Textbook
John Frawley Hardcover R945 Discovery Miles 9 450
Spiritual Astrology - A Guide to the…
Mari Silva Hardcover R630 R569 Discovery Miles 5 690
Ungrading - Why Rating Students…
Susan D. Blum Paperback R659 Discovery Miles 6 590

 

Partners