0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (409)
  • R250 - R500 (1,167)
  • R500+ (11,486)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Cognitive (Internet of) Things - Collaboration to Optimize Action (Hardcover, 1st ed. 2016): Arvind Sathi Cognitive (Internet of) Things - Collaboration to Optimize Action (Hardcover, 1st ed. 2016)
Arvind Sathi
R968 R783 Discovery Miles 7 830 Save R185 (19%) Ships in 10 - 15 working days

This book explores cognitive behavior among Internet of Things. Using a series of current and futuristic examples - appliances, personal assistants, robots, driverless cars, customer care, engineering, monetization, and many more - the book covers use cases, technology and communication aspects of how machines will support individuals and organizations. This book examines the Cognitive Things covering a number of important questions: * What are Cognitive Things? * What applications can be driven from Cognitive Things - today and tomorrow? * How will these Cognitive Things collaborate with each and other, with individuals and with organizations? * What is the cognitive era? How is it different from the automation era? * How will the Cognitive Things support or accelerate human problem solving? * Which technical components make up cognitive behavior? * How does it redistribute the work-load between humans and machines? * What types of data can be collected from them and shared with external organizations? * How do they recognize and authenticate authorized users? How is the data safeguarded from potential theft? Who owns the data and how are the data ownership rights enforced? Overall, Sathi explores ways in which Cognitive Things bring value to individuals as well as organizations and how to integrate the use of the devices into changing organizational structures. Case studies are used throughout to illustrate how innovators are already benefiting from the initial explosion of devices and data. Business executives, operational managers, and IT professionals will understand the fundamental changes required to fully benefit from cognitive technologies and how to utilize them for their own success.

Cyberculture Theorists - Manuel Castells and Donna Haraway (Hardcover): David Bell Cyberculture Theorists - Manuel Castells and Donna Haraway (Hardcover)
David Bell; Series edited by Robert Eaglestone
R2,532 Discovery Miles 25 320 Ships in 12 - 17 working days

This book surveys a 'cluster' of works that seek to explore the cultures of cyberspace, the Internet and the information society. It introduces key ideas, and includes detailed discussion of the work of two key thinkers in this area, Manuel Castells and Donna Haraway, as well as outlining the development of cyberculture studies as a field. To do this, the book also explores selected 'moments' in this development, from the early 1990s, when cyberspace and cyberculture were only just beginning to come together as ideas, up to the present day, when the field of cyberculture studies has grown and bloomed, producing innovative theoretical and empirical work from a diversity of standpoints. Key topics include: life on the screen network society space of flows cyborg methods. Cyberculture Theorists is the ideal starting point for anyone wanting to understand how to theorise cyberculture in all its myriad forms.

The Internet and Politics - Citizens, Voters and Activists (Paperback, New Ed): Sarah Oates, Diana Owen, Rachel K. Gibson The Internet and Politics - Citizens, Voters and Activists (Paperback, New Ed)
Sarah Oates, Diana Owen, Rachel K. Gibson
R1,356 Discovery Miles 13 560 Ships in 12 - 17 working days

This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: is the Internet qualitatively different from the more traditional forms of the media? has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen, or via better state transparency? does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? in authoritarian states, does the Internet function as a beacon for free speech or as another tool for propaganda?

The Practical Guide to HIPAA Privacy and Security Compliance (Paperback, 2nd edition): Rebecca Herold, Kevin Beaver The Practical Guide to HIPAA Privacy and Security Compliance (Paperback, 2nd edition)
Rebecca Herold, Kevin Beaver
R2,065 Discovery Miles 20 650 Ships in 9 - 15 working days

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated and revised with several new sections, this edition defines what HIPAA is, what it requires, and what you need to do to achieve compliance. The book provides an easy-to-understand overview of HIPAA privacy and security rules and compliance tasks. Supplying authoritative insights into real-world HIPAA privacy and security issues, it summarizes the analysis, training, and technology needed to properly plan and implement privacy and security policies, training, and an overall program to manage information risks. Instead of focusing on technical jargon, the book spells out what your organization must do to achieve and maintain compliance requirements on an ongoing basis.

Internet of Behaviors (IoB) (Hardcover): R. Dhaya, R. Kanthavel Internet of Behaviors (IoB) (Hardcover)
R. Dhaya, R. Kanthavel
R3,024 Discovery Miles 30 240 Ships in 12 - 17 working days

1. The book will begin by evaluating the state of the art of all Internet Of behaviors (IoB) while looking into their BI, Big Data, CDPs, etc. core building block 2. Offers in-depth examination of Internet Of behaviors, which supports 3. Includes handy quick-reference to help readers with regular with simple language rules; 4. This book goal is to record, analyse, comprehend, and respond to all forms of human behaviour in a way that allows people to be tracked and interpreted using developing technology advancements and advances in machine learning algorithms

Closer Together, Further Apart - The Effect of Technology and the Internet on Parenting, Work, and Relationships (Paperback):... Closer Together, Further Apart - The Effect of Technology and the Internet on Parenting, Work, and Relationships (Paperback)
Robert Weiss, Jennifer P Schneider
R419 R355 Discovery Miles 3 550 Save R64 (15%) Ships in 10 - 15 working days

Closer Together, Further Apart offers current unique insight into the cultural shifts brought about by digital technology and the Internet. It considers how these new connections are impacting not only society as a whole, but more specifically communication in relationships and across generations.
Digital technology has in less than a single generation, dramatically and permanently altered the ways in which humans connect and communicate with each other. Conversations and information transfers that once either weren't possible or took days to complete now occur in an instant. Technological advances are profoundly affecting humankind, forcing us to change on multiple levels.
As with all forms of human/social/technological change, these advances will be good for some and bad for others. Those who learn to effectively absorb information and use new technologies in healthy ways will flourish, and those who don't may feel increasingly disconnected from our technology driven world.

Robert Weiss, MSW, is a therapist, international speaker, author, and a blogger on PsychCentral.com, where he writes regularly on the topic of sex and intimacy in the digital age. He was featured in LA Weekly 2013 People issue as one of LA's most fascinating people. He currently serves as Senior Vice-President of Clinical Development for Elements Behavioral Health.

Jennifer P. Schneider, MD, PhD, is a physician, international speaker, and the author of nine books and numerous journal articles.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,160 Discovery Miles 11 600 Ships in 9 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback)
Mark Tarallo
R1,155 Discovery Miles 11 550 Ships in 9 - 15 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

The Internet and Politics - Citizens, Voters and Activists (Hardcover): Sarah Oates, Diana Owen, Rachel K. Gibson The Internet and Politics - Citizens, Voters and Activists (Hardcover)
Sarah Oates, Diana Owen, Rachel K. Gibson
R3,911 Discovery Miles 39 110 Ships in 12 - 17 working days

Changes in the media landscape present new challenges for scholars interested in the relationship between the mass media and civil society. Notably, the explosion of the Internet in advanced industrial democracies and its more limited introduction in other types of regimes has provided new pathways for communication. This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: * Is the Internet qualitativey different from the more traditional forms of the media? * Has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen or via better state transparency? * Alternatively, does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? * In authoritarian states, does the Internet function as a beacon for free speech or another tool for propaganda? This book will be of interest to students and scholars of the Internet and civil society. Jensen, University of Aarhus Weiner Lusoli, University of Salford Stephen Ward, University of Salford Scott Wr

Cryptology - Classical and Modern (Paperback, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Paperback, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R1,396 Discovery Miles 13 960 Ships in 9 - 15 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

The Routledge Handbook of Privacy and Social Media (Hardcover): Sabine Trepte, Philipp Masur The Routledge Handbook of Privacy and Social Media (Hardcover)
Sabine Trepte, Philipp Masur
R6,429 Discovery Miles 64 290 Ships in 12 - 17 working days

This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education. Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors-such as culture, gender, and trust-and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy. This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.

Internet of Things in Modern Computing - Theory and Applications (Hardcover): Vinay Chowdary, Abhinav Sharma, Naveen Kumar,... Internet of Things in Modern Computing - Theory and Applications (Hardcover)
Vinay Chowdary, Abhinav Sharma, Naveen Kumar, Vivek Kaundal
R3,482 Discovery Miles 34 820 Ships in 12 - 17 working days

The text focuses on the theory, design, and implementation of the Internet of Things (IoT), in a modern communication system. It will be useful to senior undergraduate, graduate students, and researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology. Features: Presents all the necessary information on the Internet of Things in modern computing Examines antenna integration challenges and constraints in the Internet of Things devices Discusses advanced Internet of Things networks and advanced controllers required for modern architecture Explores security and privacy challenges for the Internet of Things-based health care system Covers implementation of Internet of Things security protocols such as MQTT, Advanced Message Queuing Protocol, XMPP, and DSS The text addresses the issues and challenges in implementing communication and security protocols for IoT in modern computing. It further highlights the applications of IoT in diverse areas including remote health monitoring, remote monitoring of vehicle data and environmental characteristics, industry 4.0, 5G communications, and Next-gen IoT networks. The text presents case studies on IoT in modern digital computing. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in diverse fields domains including electrical engineering, electronics and communications engineering, computer engineering, and information technology.

Playing Video Games - Motives, Responses, and Consequences (Paperback): Peter Vorderer, Jennings Bryant Playing Video Games - Motives, Responses, and Consequences (Paperback)
Peter Vorderer, Jennings Bryant
R2,236 Discovery Miles 22 360 Ships in 12 - 17 working days

From security training simulations to war games to role-playing games, to sports games to gambling, playing video games has become a social phenomena, and the increasing number of players that cross gender, culture, and age is on a dramatic upward trajectory. "Playing Video Games: Motives, Responses, and Consequences" integrates communication, psychology, and technology to examine the psychological and mediated aspects of playing video games. It is the first volume to delve deeply into these aspects of computer game play. It fits squarely into the media psychology arm of entertainment studies, the next big wave in media studies. The book targets one of the most popular and pervasive media in modern times, and it will serve to define the area of study and provide a theoretical spine for future research.
This unique and timely volume will appeal to scholars, researchers, and graduate students in media studies and mass communication, psychology, and marketing.

Crime and Punishment in the Future Internet - Digital Frontier Technologies and Criminology in the Twenty-First Century... Crime and Punishment in the Future Internet - Digital Frontier Technologies and Criminology in the Twenty-First Century (Paperback)
Sanja Milivojevic
R1,112 Discovery Miles 11 120 Ships in 9 - 15 working days

Crime and Punishment in the Future Internet is an examination of the development and impact of digital frontier technologies (DFTs) such as Artificial Intelligence, the Internet of things, autonomous mobile robots, and blockchain on offending, crime control, the criminal justice system, and the discipline of criminology. It poses criminological, legal, ethical, and policy questions linked to such development and anticipates the impact of DFTs on crime and offending. It forestalls their wide-ranging consequences, including the proliferation of new types of vulnerability, policing and other mechanisms of social control, and the threat of pervasive and intrusive surveillance. Two key concerns lie at the heart of this volume. First, the book investigates the origins and development of emerging DFTs and their interactions with criminal behaviour, crime prevention, victimisation, and crime control. It also investigates the future advances and likely impact of such processes on a range of social actors: citizens, non-citizens, offenders, victims of crime, judiciary and law enforcement, media, NGOs. This book does not adopt technological determinism that suggests technology alone drives social development. Yet, while it is impossible to know where the emerging technologies are taking us, there is no doubt that DFTs will shape the way we engage with and experience criminal behaviour in the twenty-first century. As such, this book starts the conversation about a range of essential topics that this expansion brings to social sciences, and begins to decipher challenges we will be facing in the future. An accessible and compelling read, this book will appeal to those engaged with criminology, sociology, politics, policymaking, and all those interested in the impact of DFTs on the criminal justice system.

Mastodon For Dummies (Paperback): Minnick Mastodon For Dummies (Paperback)
Minnick
R317 Discovery Miles 3 170 Ships in 12 - 17 working days

A little birdy told us you needed to know more about Mastodon Ready to escape the drama of existing social media platforms and try something new and awesome in the world of social media? In Mastodon For Dummies, experienced tech trainers Chris Minnick and Mike McCallister show you exactly how to use Mastodon, the hot decentralized social media offering on the web and destination for thousands of social media migrants. Learn how to sign up for the service on your choice of server and get familiar with the rules of what's sure to become your new favorite app. You'll discover how to connect with other people, attract your own followers, and make yourself right at home in the Mastodon community. In the book, you'll find: Easy-to-follow instructions on how to choose the Mastodon server that suits you best Instructions for establishing new connections on a new social platform and learning the rules of the road Tips for conducting business on Mastodon and making a home for your home-based business or brand on the social media service Step-by-step guides on launching your very own server If you're ready to leave old social platforms in the rear-view and try something new, grab a copy of Mastodon For Dummies.

Geoinformatics in Health Facility Analysis (Hardcover, 1st ed. 2017): Praveen Kumar Rai, Mahendra Singh Nathawat Geoinformatics in Health Facility Analysis (Hardcover, 1st ed. 2017)
Praveen Kumar Rai, Mahendra Singh Nathawat
R5,418 Discovery Miles 54 180 Ships in 10 - 15 working days

This book demonstrates how GIS techniques and statistical methods can be used to emphasise the characteristics of population and its related variables, vis-a-vis care facilities and the status of vector borne diseases, as well as for malaria modeling. Concentrating on the Varanasi district of India, the main aim of the book is to determine and map the density areas of vector borne diseases using GIS techniques. The book explores how health GIS is an important sub-discipline of health science and medical geography, which is traditionally focused on the spatial aspects of disease ecology and health care facility analysis.

Becoming a Digital Parent - A Practical Guide to Help Families Navigate Technology (Paperback): Carrie Rogers-Whitehead Becoming a Digital Parent - A Practical Guide to Help Families Navigate Technology (Paperback)
Carrie Rogers-Whitehead
R556 Discovery Miles 5 560 Ships in 9 - 15 working days

Becoming a Digital Parent is a practical, readable guide that will help all parents have confidence to successfully navigate technology with their children. It accessibly presents evidence-based guidance to offer an overview of the digital landscape, empowering parents to embrace opportunities whilst keeping children responsible and safe online. Covering a range of topics including developmental stages, screen time, bed time, gaming, digital identities, and helpful parenting apps and resources, Carrie Rogers-Whitehead explores the challenges and opportunities involved in parenting in the digital age. With advice for parents of babies through to teenagers, each chapter includes an explanation of the latest research, interviews with parents and experts, and helpful case studies gathered by the author during her extensive experience of working directly with parents and children. This book will show parents how to communicate better with their children, create a family technology plan, put in place intervention strategies when things happen, and take advantage of the benefits technology can afford us. Becoming a Digital Parent is ideal for all parents looking to effectively navigate the technological world, and the range of professionals who work with them.

Digital Ageism - How it Operates and Approaches to Tackling it (Hardcover): Andrea Rosales, Mireia Fernandez-Ardevol, Jakob... Digital Ageism - How it Operates and Approaches to Tackling it (Hardcover)
Andrea Rosales, Mireia Fernandez-Ardevol, Jakob Svensson
R4,060 Discovery Miles 40 600 Ships in 12 - 17 working days

This anthology contributes to creating awareness on how digital ageism operates in relation to the widely spread symbolic representations of old and young age, the (lack of) representation of diverse older individuals in the design, development, and discourses and in the actual algorithms and datasets. It also shows how individuals and institutions deal with digital ageism in everyday life. In the past decades, digital technologies permeated most aspects of everyday life and became ingrained into human existence. With a focus on how age is represented and experienced in relation to digital technologies leading to digital ageism, digitalisation's reinforcement of spirals of exclusion and loss of autonomy of some collectives is explored, when it could be natural for a great part of society and represent a sort of improvement. The book addresses social science students and scholars interested in everyday digital technologies, society and the power struggles about it, providing insights from different parts of the globe. By using different methods and touching upon different aspects of digital ageism and how it plays out in contemporary connected data societies, this volume will raise awareness, challenge power, initiate discussions and spur further research into this field.

Entertainment Computing - ICEC 2010 - 9th International Conference, ICEC 2010, Seoul, Korea, September 8-11, 2010. Proceedings... Entertainment Computing - ICEC 2010 - 9th International Conference, ICEC 2010, Seoul, Korea, September 8-11, 2010. Proceedings (Paperback, Edition.)
Hyun Seung Yang, Rainer Malaka, Junichi Hoshino, Jung Hyun Han
R2,960 Discovery Miles 29 600 Ships in 10 - 15 working days

The 9th International Conference on Entertainment Computing (ICEC 2010) was held in September 2010 in Seoul Korea. After Pittsburgh (2008) and Paris (2009), the event returned to Asia. The conference venue was the COEX Exhibition Hall in one of the most vivid and largest cities of the world. This amazing mega-city was a perfect location for the c- ference. Seoul is on the one hand a metropolitan area with modern industries, univer- ties and great economic power. On the other hand, it is also a place with a very fas- nating historical and cultural background. It bridges the past and the future as well as east and west. Entertainment computing also aims at building bridges from technology to leisure, education, culture and work. Entertainment computing at its core has a strong focus on computer games. However, it is not only about computer games. The last ICEC c- ferences have shown that entertainment computing is a much wider field. For instance in games, technology developed for games can be used for a wide range of appli- tions such as therapy or education. Moreover, entertainment does not necessarily have to be understood as games. Entertainment computing finds its way to stage perfo- ances and all sorts of new interactive installations.

Cyberprotest - New Media, Citizens and Social Movements (Paperback): Wim Van De Donk, Brian D. Loader, Paul G. Nixon, Dieter... Cyberprotest - New Media, Citizens and Social Movements (Paperback)
Wim Van De Donk, Brian D. Loader, Paul G. Nixon, Dieter Rucht
R1,471 Discovery Miles 14 710 Ships in 12 - 17 working days

The internet could have been purpose-built for fostering the growth of the social movements and citizen initiatives which have had such a significant impact on the political landscape since the 1990s. In "Cyberprotest" the contributors explore the effects of this synergy between ICTs (Information Communication Technologies) and people power, analysing the implications for politics and social policy at both a national and a global level. Through a number of different international examples answers are sought to questions such as: to what extent and in what forms do social movements use ICTs?; how do new ICTs facilitate new patterns and forms of citizen mobilization?; how does this use affect the relationship between social movements and their members?; how do ICTs change the way social movement organizations communicate with each other?; and how do they affect the way these movements mobilize and intervene in public debates and political conflicts?

Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Hardcover): Andrew A. Bochman,... Countering Cyber Sabotage - Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) (Hardcover)
Andrew A. Bochman, Sarah Freeman
R2,036 Discovery Miles 20 360 Ships in 9 - 15 working days

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.

Cybertax - Managing the Risks and Results (Hardcover): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Hardcover)
George K. Tsantes, James Ransome
R3,008 Discovery Miles 30 080 Ships in 12 - 17 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Node.London Reader II (Paperback, New): Node.London Network Node.London Reader II (Paperback, New)
Node.London Network
R202 Discovery Miles 2 020 Ships in 12 - 17 working days

The NODE.London Reader II projects a critical context around the Season of Media Arts in London, March 2008. NODE.London (Networked, Open, Distributed, Events. London) is a voluntary network of people, organisations and projects sharing and developing the infrastructure for media arts and related ctivities in London and beyond. This reader revisits debates on media arts and activism, collaborative practices and organization and the political economy of media economics. It includes contributions from Ruth Catlow, Marc Garrett, Anna Colin, Julie Freeman, Matthew Fuller, Usman Haque, Jamie King, Armin Medosch, Jonas Andersson, Toni Prug, Adnan Hadzi, Cinzia Cremona and Petra Bauer. Edited by Mia Jankowicz, Anna Colin, Adnan Hadzi and Jonas Andersson.

Screenplay - Children and Computing in the Home (Paperback): Keri Facer, John Furlong, Ruth Furlong, Rosamund Sutherland Screenplay - Children and Computing in the Home (Paperback)
Keri Facer, John Furlong, Ruth Furlong, Rosamund Sutherland
R1,025 Discovery Miles 10 250 Ships in 12 - 17 working days


Contents:
Section 1. Introduction 1. The ScreenPlay project 2. Setting the scene: Patterns of computer use in the home Section 2. The domestic context 3. Computer histories, computer roles in the home 4. The computer in family life Section 3. Young people's computer use in the home 5. The digital landscape: Games and information navigation 6. Writing, designing and making on the computer in the home Section 4. Digital cultures 7. Computers, consumption and identity 8. Computers, gender and class 9. Digital childhood Section 5. Learning with the computer 10. Learning with the computer at home 11. Learning with computers at school 12. Conclusion

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,451 Discovery Miles 24 510 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R211 Discovery Miles 2 110
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,151 Discovery Miles 31 510
The Handover - How We Gave Control Of…
David Runciman Hardcover R630 R504 Discovery Miles 5 040
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,357 Discovery Miles 63 570
Slenderman - Online Obsession, Mental…
Kathleen Hale Hardcover R733 R614 Discovery Miles 6 140
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R249 Discovery Miles 2 490
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R440 Discovery Miles 4 400
These Things Really Do Happen To Me
Khaya Dlanga Paperback  (1)
R210 R164 Discovery Miles 1 640
I Am Code
Brent Katz, Josh Morgenthau, … Paperback R390 R312 Discovery Miles 3 120

 

Partners