0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (210)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Tor Bible (Paperback): Arlen Kraham Tor Bible (Paperback)
Arlen Kraham
R974 Discovery Miles 9 740 Ships in 10 - 15 working days
Enterprise Cloud Security and Governance (Paperback): Zeal Vora Enterprise Cloud Security and Governance (Paperback)
Zeal Vora
R1,254 Discovery Miles 12 540 Ships in 10 - 15 working days

Build a resilient cloud architecture to tackle data disasters with ease About This Book * Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform * Practical examples to ensure you secure your Cloud environment efficiently * A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Who This Book Is For If you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial. What You Will Learn * Configure your firewall and Network ACL * Protect your system against DDOS and application-level attacks * Explore cryptography and data security for your cloud * Get to grips with configuration management tools to automate your security tasks * Perform vulnerability scanning with the help of the standard tools in the industry * Learn about central log management In Detail Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. Style and approach This book follows a step-by-step, practical approach to secure your applications and data when they are located remotely.

The Ultimate GDPR Practitioner Guide - Demystifying Privacy & Data Protection (Paperback): Stephen Massey The Ultimate GDPR Practitioner Guide - Demystifying Privacy & Data Protection (Paperback)
Stephen Massey
R721 R625 Discovery Miles 6 250 Save R96 (13%) Ships in 10 - 15 working days
Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback): Seth... Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback)
Seth McKinnon
R197 Discovery Miles 1 970 Ships in 10 - 15 working days
An Essential Guide to Cybersecurity - What You Need to Know (Paperback): Veronica Miller An Essential Guide to Cybersecurity - What You Need to Know (Paperback)
Veronica Miller; David Miller
R337 Discovery Miles 3 370 Ships in 10 - 15 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.)
Michael W Lucas
R720 R634 Discovery Miles 6 340 Save R86 (12%) Ships in 10 - 15 working days
Hacking - Hacking For Beginners and Basic Security: How To Hack (Paperback): Jacob Hatcher Hacking - Hacking For Beginners and Basic Security: How To Hack (Paperback)
Jacob Hatcher
R360 Discovery Miles 3 600 Ships in 10 - 15 working days
Simple Internet Safety - The Knowledge You Need to Avoid Being Scammed (Paperback): Michael Paulhus Simple Internet Safety - The Knowledge You Need to Avoid Being Scammed (Paperback)
Michael Paulhus
R451 Discovery Miles 4 510 Ships in 10 - 15 working days
Hacking & Tor - The Complete Beginners Guide To Hacking, Tor, & Accessing The Deep Web & Dark Web (Paperback): Jack Jones Hacking & Tor - The Complete Beginners Guide To Hacking, Tor, & Accessing The Deep Web & Dark Web (Paperback)
Jack Jones
R755 Discovery Miles 7 550 Ships in 10 - 15 working days
Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores... Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores (Paperback)
Josh Ochs
R226 Discovery Miles 2 260 Ships in 10 - 15 working days
Security and Privacy in an It World - Managing and Meeting Online Regulatory Compliance in the 21st Century (Paperback): Craig... Security and Privacy in an It World - Managing and Meeting Online Regulatory Compliance in the 21st Century (Paperback)
Craig Mackinder; Designed by Daniel Crack; Edited by Michael Carroll
R390 R326 Discovery Miles 3 260 Save R64 (16%) Ships in 10 - 15 working days
Audio Content Security - Attack Analysis on Audio Watermarking (Paperback): Sogand Ghorbani, I.S. Dr. Amiri Audio Content Security - Attack Analysis on Audio Watermarking (Paperback)
Sogand Ghorbani, I.S. Dr. Amiri
R1,943 Discovery Miles 19 430 Ships in 10 - 15 working days

Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.

C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking... C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R536 Discovery Miles 5 360 Ships in 10 - 15 working days
Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover): Bryce Austin Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover)
Bryce Austin
R1,003 Discovery Miles 10 030 Ships in 10 - 15 working days
The Expanding Cyber Threat (Paperback): Subcommittee on Research and Technology The Expanding Cyber Threat (Paperback)
Subcommittee on Research and Technology
R485 Discovery Miles 4 850 Ships in 10 - 15 working days
Black Hat Banking - A Hacker's Guide to Financial Security & Privacy (Paperback): M Blaine Faulkner Black Hat Banking - A Hacker's Guide to Financial Security & Privacy (Paperback)
M Blaine Faulkner
R345 Discovery Miles 3 450 Ships in 10 - 15 working days
Examining the President's Cybersecurity Information-Sharing Proposal (Paperback): Committee on Homeland Security House of Examining the President's Cybersecurity Information-Sharing Proposal (Paperback)
Committee on Homeland Security House of
R387 Discovery Miles 3 870 Ships in 10 - 15 working days
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback): Infrastru Subcommittee on... Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback)
Infrastru Subcommittee on Cybersecurity
R385 Discovery Miles 3 850 Ships in 10 - 15 working days
Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback):... Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback)
Jay Schulman
R175 Discovery Miles 1 750 Ships in 10 - 15 working days
Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element... Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element Of The Threat Within Your Business In Seven Successful Practices (Paperback)
Boaz Fischer
R523 Discovery Miles 5 230 Ships in 10 - 15 working days
IN Security - Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Paperback): Jane Frankland IN Security - Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Paperback)
Jane Frankland
R716 Discovery Miles 7 160 Ships in 10 - 15 working days
Systems Security Engineering - Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems... Systems Security Engineering - Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems (Paperback)
National Institute of St And Technology, U. S. Department of Commerce
R528 Discovery Miles 5 280 Ships in 10 - 15 working days
Down the Rabbit Hole An OSINT Journey - Open Source Intelligence Gathering for Penetration Testing (Paperback): Chris Kubecka Down the Rabbit Hole An OSINT Journey - Open Source Intelligence Gathering for Penetration Testing (Paperback)
Chris Kubecka
R917 Discovery Miles 9 170 Ships in 10 - 15 working days
Tor - Access the Dark Net, Stay Anonymous Online and Escape NSA Spying (Paperback): Evan Lane Tor - Access the Dark Net, Stay Anonymous Online and Escape NSA Spying (Paperback)
Evan Lane
R376 Discovery Miles 3 760 Ships in 10 - 15 working days
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive... Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive Analytics and Data Science with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R516 Discovery Miles 5 160 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
Information And Communications…
Dana van der Merwe Paperback R1,257 R1,116 Discovery Miles 11 160
Containing Big Tech - How To Protect Our…
Tom Kemp Hardcover R712 R603 Discovery Miles 6 030
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R500 Discovery Miles 5 000
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R291 R262 Discovery Miles 2 620
On Thin Ice
Leading Cybersecurity Experts Hardcover R678 Discovery Miles 6 780
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,127 Discovery Miles 21 270
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,865 Discovery Miles 28 650

 

Partners