0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (391)
  • R250 - R500 (1,136)
  • R500+ (11,268)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

The Lazarus Heist - From Hollywood To High Finance, Inside North Korea's Global Cyber War (Paperback): Geoff White The Lazarus Heist - From Hollywood To High Finance, Inside North Korea's Global Cyber War (Paperback)
Geoff White 1
R350 R277 Discovery Miles 2 770 Save R73 (21%) Ships in 3 - 5 working days

The jaw-dropping story behind North Korea's dangerous cyber-criminals, the Lazarus Group, who hacked Hollywood and the world.

In 2014, Sony Pictures Entertainment was brutally hacked, with thousands of computers wiped and the personal data of hundreds of employees released online. This was the world's first glance at the Lazarus Group, a shadowy consortium of hackers working on behalf of the North Korean state. Since then, the group has grown into one of the most effective criminal enterprises on the planet - it is estimated they have stolen over $150 million dollars and almost $2bn million in cryptocurrency from financial institutions worldwide, from the United States, to Ecuador to the Philippines, and infamously bringing the British health service to a halt in 2018.

In The Lazarus Heist, investigative journalist Geoff White examines how the North Korean regime has harnessed cutting-edge technology to launch a decade-long campaign of brazen and merciless raids on its richer, more powerful adversaries. From the bustling streets of Dhaka, to the glamourous studios of Hollywood, to the secretive dynastic court of Pyongyang, this is the shocking story of the world's most elite hackers, their victims and the people who have tried - and ultimately, failed - to stop them.

Rapidly Prototyping Interfaces with InDesign (Hardcover): Carla Viviana Coleman Rapidly Prototyping Interfaces with InDesign (Hardcover)
Carla Viviana Coleman
R4,305 Discovery Miles 43 050 Ships in 12 - 17 working days

Rapidly Prototyping Interfaces with InDesign guides readers to learn to create a wide range of interfaces, from mobile to desktop. With InDesign, interface prototyping takes minutes instead of days. This book is code-free and entirely hands-on with InDesign tools. This book acts as a guide for how to prototype user interfaces with InDesign, using diagrams, illustrations, and screen shots. This illustrated book concerns the creation and prototyping of eBooks, eMagazines, websites, desktop apps and movile apps. InDesign is an important tool for rapid prototyping, as no coding is involved. Key Features No available book provides this information. The reader will learn how to prototype a wide range of interfaces for both desktop and movile platforms. The book will include software screen shots and guide the reader step by step. The example prototypes will be interactive. Users can test them using interactive devices, such as desktop computers, tablets or mobile phones. The reader will learn how to prepare an effective portfolio and resume.

Digital Piracy - A Global, Multidisciplinary Account (Hardcover): Steven Caldwell Brown, Thomas Holt Digital Piracy - A Global, Multidisciplinary Account (Hardcover)
Steven Caldwell Brown, Thomas Holt
R4,141 Discovery Miles 41 410 Ships in 12 - 17 working days

Non-Commercial digital piracy has seen an unprecedented rise in the wake of the digital revolution; with wide-scale downloading and sharing of copyrighted media online, often committed by otherwise law-abiding citizens. Bringing together perspectives from criminology, psychology, business, and adopting a morally neutral stance, this book offers a holistic overview of this growing phenomenon. It considers its cultural, commercial, and legal aspects, and brings together international research on a range of topics, such as copyright infringement, intellectual property, music publishing, movie piracy, and changes in consumer behaviour. This book offers a new perspective to the growing literature on cybercrime and digital security. This multi-disciplinary book is the first to bring together international research on digital piracy and will be key reading for researchers in the fields of criminology, psychology, law and business.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover)
Mark Tarallo
R1,900 Discovery Miles 19 000 Ships in 12 - 17 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

Multiplayer Online Games - Origins, Players, and Social Dynamics (Hardcover): Guo Freeman Multiplayer Online Games - Origins, Players, and Social Dynamics (Hardcover)
Guo Freeman
R4,286 Discovery Miles 42 860 Ships in 12 - 17 working days

Multiplayer Online Games (MOGs) have become a new genre of "play culture," integrating communication and entertainment in a playful, computer-mediated environment that evolves through user interaction. This book comprehensively reviews the origins, players, and social dynamics of MOGs, as well as six major empirical research methods used in previous works to study MOGs (i.e., observation/ethnography, survey/interviews, content and discourse analysis, experiments, network analysis, and case studies). It concludes that MOGs represent a highly sophisticated, networked, multimedia and multimodal Internet technology, which can construct entertaining, simultaneous, persistent social virtual worlds for gamers. Overall, the book shows that what we can learn from MOGs is how games and gaming, as ubiquitous activities, fit into ordinary life in today's information society, in the moments where the increased use of media as entertainment, the widespread application of networked information technologies, and participation in new social experiences intersect. Key Features: Contains pertinent knowledge about online gaming: its history, technical features, player characteristics, social dynamics, and research methods Sheds light on the potential future of online gaming, and how this would impact every aspect of our everyday lives - socially, culturally, technologically, and economically Asks promising questions based on cutting-edge research in the field of online game design and development

Fundamentals of Graphics Using MATLAB (Paperback): Ranjan Parekh Fundamentals of Graphics Using MATLAB (Paperback)
Ranjan Parekh
R1,495 Discovery Miles 14 950 Ships in 12 - 17 working days

This book introduces fundamental concepts and principles of 2D and 3D graphics and is written for undergraduate and postgraduate students of computer science, graphics, multimedia, and data science. It demonstrates the use of MATLAB (R) programming for solving problems related to graphics and discusses a variety of visualization tools to generate graphs and plots. The book covers important concepts like transformation, projection, surface generation, parametric representation, curve fitting, interpolation, vector representation, and texture mapping, all of which can be used in a wide variety of educational and research fields. Theoretical concepts are illustrated using a large number of practical examples and programming codes, which can be used to visualize and verify the results. Key Features: Covers fundamental concepts and principles of 2D and 3D graphics Demonstrates the use of MATLAB (R) programming for solving problems on graphics Provides MATLAB (R) codes as answers to specific numerical problems Provides codes in a simple copy and execute format for the novice learner Focuses on learning through visual representation with extensive use of graphs and plots Helps the reader gain in-depth knowledge about the subject matter through practical examples Contains review questions and practice problems with answers for self-evaluation

Managing Cyber Risk in the Financial Sector - Lessons from Asia, Europe and the USA (Paperback): Ruth Taplin Managing Cyber Risk in the Financial Sector - Lessons from Asia, Europe and the USA (Paperback)
Ruth Taplin
R1,472 Discovery Miles 14 720 Ships in 12 - 17 working days

Cyber risk has become increasingly reported as a major problem for financial sector businesses. It takes many forms including fraud for purely monetary gain, hacking by people hostile to a company causing business interruption or damage to reputation, theft by criminals or malicious individuals of the very large amounts of customer information ("big data") held by many companies, misuse including accidental misuse or lack of use of such data, loss of key intellectual property, and the theft of health and medical data which can have a profound effect on the insurance sector. This book assesses the major cyber risks to businesses and discusses how they can be managed and the risks reduced. It includes case studies of the situation in different financial sectors and countries in relation to East Asia, Europe and the United States. It takes an interdisciplinary approach assessing cyber risks and management solutions from an economic, management risk, legal, security intelligence, insurance, banking and cultural perspective.

Millennial Love (Paperback): Olivia Petter Millennial Love (Paperback)
Olivia Petter
R227 Discovery Miles 2 270 Ships in 12 - 17 working days

A 2021 'BOOK TO LOOK OUT FOR' - THE INDEPENDENT 'A mouthpiece for our anxieties and a tonic for our hearts.' Charly Cox 'Funny and honest.' Pandora Sykes 'Offers readers of all stripes and ages a great overview of relationships in the digital era'. Matt Haig Have you ever been ghosted? Found yourself stalking your partner's ex for days on Instagram? Spent hours swiping right (or left) to no avail? Yep, us too. Finding love today is overwhelming. Thanks to apps, social media, and even reality TV, the way we date is constantly changing. But how is it possible that, despite having so much technology designed to aid connection, it feels harder to meet someone now than ever before? In Millennial Love, journalist Olivia Petter expertly investigates this question, providing a reassuring and relatable exploration of modern dating.

Death and Digital Media (Paperback): Michael Arnold, Martin Gibbs, Tamara Kohn, James Meese, Bjorn Nansen Death and Digital Media (Paperback)
Michael Arnold, Martin Gibbs, Tamara Kohn, James Meese, Bjorn Nansen; Afterword by …
R1,217 Discovery Miles 12 170 Ships in 12 - 17 working days

Death and Digital Media provides a critical overview of how people mourn, commemorate and interact with the dead through digital media. It maps the historical and shifting landscape of digital death, considering a wide range of social, commercial and institutional responses to technological innovations. The authors examine multiple digital platforms and offer a series of case studies drawn from North America, Europe and Australia. The book delivers fresh insight and analysis from an interdisciplinary perspective, drawing on anthropology, sociology, science and technology studies, human-computer interaction, and media studies. It is key reading for students and scholars in these disciplines, as well as for professionals working in bereavement support capacities.

Prototype Nation - China and the Contested Promise of Innovation (Paperback): Silvia M. Lindtner Prototype Nation - China and the Contested Promise of Innovation (Paperback)
Silvia M. Lindtner
R592 Discovery Miles 5 920 Ships in 12 - 17 working days

A vivid look at China's shifting place in the global political economy of technology production How did China's mass manufacturing and "copycat" production become transformed, in the global tech imagination, from something holding the nation back to one of its key assets? Prototype Nation offers a rich transnational analysis of how the promise of democratized innovation and entrepreneurial life has shaped China's governance and global image. With historical precision and ethnographic detail, Silvia Lindtner reveals how a growing distrust in Western models of progress and development, including Silicon Valley and the tech industry after the financial crisis of 2007-8, shaped the rise of the global maker movement and the vision of China as a "new frontier" of innovation. Lindtner's investigations draw on more than a decade of research in experimental work spaces-makerspaces, coworking spaces, innovation hubs, hackathons, and startup weekends-in China, the United States, Africa, Europe, Taiwan, and Singapore, as well as in key sites of technology investment and industrial production-tech incubators, corporate offices, and factories. She examines how the ideals of the maker movement, to intervene in social and economic structures, served the technopolitical project of prototyping a "new" optimistic, assertive, and global China. In doing so, Lindtner demonstrates that entrepreneurial living influences governance, education, policy, investment, and urban redesign in ways that normalize the persistence of sexism, racism, colonialism, and labor exploitation. Prototype Nation shows that by attending to the bodies and sites that nurture entrepreneurial life, technology can be extricated from the seemingly endless cycle of promise and violence. Cover image: Courtesy of Cao Fei, Vitamin Creative Space and Spru th Magers

A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Hardcover): Michael Anthony C. Dizon A Socio-Legal Study of Hacking - Breaking and Remaking Law and Technology (Hardcover)
Michael Anthony C. Dizon
R4,443 Discovery Miles 44 430 Ships in 12 - 17 working days

The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.

Salesforce Architect's Handbook - A Comprehensive End-to-End Solutions Guide (Paperback, 1st ed.): Dipanker Jyoti, James... Salesforce Architect's Handbook - A Comprehensive End-to-End Solutions Guide (Paperback, 1st ed.)
Dipanker Jyoti, James A. Hutcherson
R1,414 Discovery Miles 14 140 Ships in 12 - 17 working days

Take a deep dive into the architectural approach, best practices, and key considerations needed to comprehend, evaluate, and design an efficient, scalable, and sustainable Salesforce-based solution. This book takes a comprehensive look at the seven architectural domains that must be considered when architecting a Salesforce-based solution and equips you to develop the artifacts needed for an end-to-end enterprise architecture blueprint for Salesforce implementation and DevOps. This must-have handbook helps Salesforce professionals implement and manage Salesforce in their organization. You will learn Salesforce architecture: solution architecture, data architecture, security architecture, integration architecture, identity and access management architecture, and strategies that can be used for Salesforce-based mobile applications. In addition to the main architecture concepts, the book also offers industry best practices and the recommended framework for approaching, managing, delivering, and continuously improving a Salesforce solution using its Salesforce Development & Deployment Lifecycle. What You Will Learn Get a detailed overview of the Salesforce multi-tenant, metadata-driven architectural framework and the under-the-hood technology stack that supports Salesforce Know the seven architecture domains, their intricacies, and the considerations needed within each when designing a Salesforce solution Have an architectural mindset and the artifacts needed to architect an end-to-end enterprise-level implementation of Salesforce Be familiar with the most common Salesforce products, licenses, AppExchange products, and the key considerations of using out-of-the-box declarative capabilities vs custom programmatic capabilities of Salesforce Understand data architecture design considerations that include data modeling in Salesforce, identifying and mitigating large data volume concerns, and the key considerations for data migration and data archiving strategies Understand security architecture considerations related to securing data within Salesforce and the various approaches to allow or restrict sharing and visibility from within Salesforce Understand integration architecture considerations that provide an overview of the integration patterns and the integrations solutions that can be used with Salesforce to connect Salesforce with a remote system hosted on-premises, on the cloud, or by third-party solution providers Understand identity and access management architectural considerations across the 9 stages of an identity and access management lifecycle Be aware of the strategies available to design mobile solutions with Salesforce and the options available for Salesforce mobile architecture Employ the principles of the DevOps & Development Lifecycle needed for an ideal state Salesforce implementation Who This Book Is For Professionals interested in implementing, optimizing, and architecting Salesforce solutions enterprise-wide; Salesforce implementation (SI) partners needing a detailed playbook for architecting and delivering successful Salesforce solutions; Salesforce admins, developers, and architects looking for a one-stop educational resource to mastering the Salesforce architect domains or those pursuing the Salesforce architecture domain certification exams, including the Salesforce Certified Technical Architect (CTA) board exam

Digital Technology and Sustainability - Engaging the Paradox (Hardcover): Mike Hazas, Lisa Nathan Digital Technology and Sustainability - Engaging the Paradox (Hardcover)
Mike Hazas, Lisa Nathan
R4,134 Discovery Miles 41 340 Ships in 12 - 17 working days

This book brings together diverse voices from across the field of sustainable human computer interaction (SHCI) to discuss what it means for digital technology to support sustainability and how humans and technology can work together optimally for a more sustainable future. Contemporary digital technologies are hailed by tech companies, governments and academics as leading-edge solutions to the challenges of environmental sustainability; smarter homes, more persuasive technologies, and a robust Internet of Things hold the promise for creating a greener world. Yet, deployments of interactive technologies for such purposes often lead to a paradox: they algorithmically "optimize" heating and lighting of houses without regard to the dynamics of daily life in the home; they can collect and display data that allow us to reflect on energy and emissions, yet the same information can cause us to raise our expectations for comfort and convenience; they might allow us to share best practice for sustainable living through social networking and online communities, yet these same systems further our participation in consumerism and contribute to an ever-greater volume of electronic waste.By acknowledging these paradoxes, this book represents a significant critical inquiry into digital technology's longer-term impact on ideals of sustainability. Written by an interdisciplinary team of contributors this book will be of great interest to students and scholars of human computer interaction and environmental studies.

Calling Bullsh*t - The Art Of Scepticism In A Data-Driven World (Paperback): Jevin D. West, Carl T. Bergstrom Calling Bullsh*t - The Art Of Scepticism In A Data-Driven World (Paperback)
Jevin D. West, Carl T. Bergstrom 2
R405 R324 Discovery Miles 3 240 Save R81 (20%) Ships in 5 - 10 working days

We think we know bullshit when we hear it, but do we?

Two science professors give us the tools to dismantle misinformation and think clearly in a world of fake news and bad data

Politicians are unconstrained by facts. Science is conducted by press release. Start-up culture elevates hype to high art. The world is awash in bullshit, and we're drowning in it.

Based on a popular course at the University of Washington, this book gives us the tools to see through the obfuscations, deliberate and careless, that dominate every realm of our lives. In this lively, provocative guide, biologist Carl Bergstrom and data scientist Jevin West show that calling out nonsense is crucial to a properly functioning social group, whether it be a circle of friends, a community of researchers, or the citizens of a nation.

Through six rules of thumb, they help us to recognize when numbers are being manipulated, to cut through the crap wherever we encounter it - even within ourselves - and learn how to give the real facts to a crystal-loving friend or climate change denier uncle.

Calling Bullshit is an indispensable handbook to the art of scepticism.

Move Fast and Break Things - How Facebook, Google, and Amazon Have Cornered Culture and What It Means For All Of Us (Hardcover,... Move Fast and Break Things - How Facebook, Google, and Amazon Have Cornered Culture and What It Means For All Of Us (Hardcover, Main Market Ed.)
Jonathan Taplin 1
R601 R495 Discovery Miles 4 950 Save R106 (18%) Ships in 12 - 17 working days

A Financial Times 'Best Thing I Read This Year' 2017 LONGLISTED FOR THE FT & MCKINSEY BUSINESS BOOK OF THE YEAR AWARD Google. Amazon. Facebook. The modern world is defined by vast digital monopolies turning ever-larger profits. Those of us who consume the content that feeds them are farmed for the purposes of being sold ever more products and advertising. Those that create the content - the artists, writers and musicians - are finding they can no longer survive in this unforgiving economic landscape. But it didn't have to be this way. In Move Fast and Break Things, Jonathan Taplin offers a succinct and powerful history of how online life began to be shaped around the values of the entrepreneurs like Peter Thiel and Larry Page who founded these all-powerful companies. Their unprecedented growth came at the heavy cost of tolerating piracy of books, music and film, while at the same time promoting opaque business practices and subordinating the privacy of individual users to create the surveillance marketing monoculture in which we now live. It is the story of a massive reallocation of revenue in which $50 billion a year has moved from the creators and owners of content to the monopoly platforms. With this reallocation of money comes a shift in power. Google, Facebook and Amazon now enjoy political power on par with Big Oil and Big Pharma, which in part explains how such a tremendous shift in revenues from creators to platforms could have been achieved and why it has gone unchallenged for so long. And if you think that's got nothing to do with you, their next move is to come after your jobs. Move Fast and Break Things is a call to arms, to say that is enough is enough and to demand that we do everything in our power to create a different future.

Designing Map Interfaces - Patterns for Building Effective Map Apps (Paperback): Michael Gaigg Designing Map Interfaces - Patterns for Building Effective Map Apps (Paperback)
Michael Gaigg
R962 R846 Discovery Miles 8 460 Save R116 (12%) Ships in 9 - 15 working days

Create useful and usable map apps that your users will love. Turn your next map app project into a success with Designing Map Interfaces: Patterns for Building Effective Map Apps. Whether you're configuring an out-of-the-box solution, building an app using one of the readily available app builder tools, or working on a custom app project, this book will guide you toward developing more useful and usable apps. Current courses for application development focus on technology and architecture rather than the tenets of interface design. This book teaches GIS professionals, developers, and designers the principles and best practices that will help them create stunning consumer-grade apps. Designing Map Interfaces provides a language for planning and building map apps. The elements of this language are made up of user interface (UI) patterns. Each pattern describes a solution to an observed and recurring problem in UI design. This book explains when to use the pattern, why it is important, and what to consider--and in turn will help readers make educated decisions on what, why, when, and how to solve problems to make their apps work. Throughout the book, patterns are illustrated through real-world examples. Key topics include: getting started with design, selecting the right layout, interacting with the map, dealing with complex data, designing for mobile devices, building single-purpose apps, and common mistakes and how to avoid them. This book is aimed at anyone that configures (solution engineers, GIS professionals) or builds (developer community, designers) map apps, especially the fast-growing group of users who employ application builders and tools that create apps to publish their own data and maps on the web. Designing Map Interfaces fills the gap that documentation lacks--practical tips on how to assemble a meaningful UI. This book is the essential guide to designing map interfaces that are usable and efficient, and look good in the process.

7 Steps to Sharing Your School's Story on Social Media (Paperback): Jason Kotch, Edward Cosentino 7 Steps to Sharing Your School's Story on Social Media (Paperback)
Jason Kotch, Edward Cosentino
R947 Discovery Miles 9 470 Ships in 12 - 17 working days

7 Steps to Sharing Your School's Story on Social Media empowers school leaders to use social media through a simple and accessible plan that increases engagement and enhances the school's vision and mission. In a step-by-step guide for easy implementation, this book provides the nuts and bolts, as well as the strategic planning necessary, to ensure intentionality and impact of your social media presence. The authors explain how to measure impact and improve your strategies to ensure important information about your school is conveyed accurately, clearly, and effectively. Whether you use the 7 steps in order or you're just looking for some invigorating new ideas or you want to find new ways to connect, collaborate, and share, there is something for every school leader in this book.

Cryptography (Hardcover): William Buchanan Cryptography (Hardcover)
William Buchanan
R1,923 Discovery Miles 19 230 Ships in 10 - 15 working days

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: - full provision of Web-based material on almost every topic covered - provision of additional on-line material, such as videos, source code, and labs - coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs) Key areas covered include: - Fundamentals of Encryption - Public Key Encryption - Symmetric Key Encryption - Hashing Methods - Key Exchange Methods - Digital Certificates and Authentication - Tunneling - Crypto Cracking - Light-weight Cryptography - Blockchain - Zero-knowledge Proofs This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

Ethical Hacking and Penetration Testing Guide (Hardcover): Rafay Baloch Ethical Hacking and Penetration Testing Guide (Hardcover)
Rafay Baloch
R5,201 Discovery Miles 52 010 Ships in 12 - 17 working days

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R994 Discovery Miles 9 940 Ships in 12 - 17 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Ubiquitous Multimedia Computing (Paperback): Qing Li, Timothy K. Shih Ubiquitous Multimedia Computing (Paperback)
Qing Li, Timothy K. Shih
R2,213 Discovery Miles 22 130 Ships in 12 - 17 working days

Computing is ubiquitous and if you think otherwise, that in itself might be the best evidence that it is so. Computers are omnipresent in modern life and the multimedia computing environment of today is becoming more and more seamless. Bringing together contributions from dozens of leading experts, Ubiquitous Multimedia Computing educates readers on Ubi-Media Computing on three levels: infrastructures, where fundamental technologies are being developed; middleware, where the integration of technologies and software systems continues to be defined; and applications, where its concepts are evolving into real-world products and processes. In presenting a wealth of new directions and new technology that is changing the way we communicate, learn, play, and live day by day, this book - Examines various architectures for delivering multimedia content including streaming devices , wireless networks, and various hybrids Looks at rapidly developing sensor technology including wearable computers Demonstrates the use of advanced HCI devices that allow the simplest body gestures to govern increasingly complex tasks Introduces newsputers that take the use of embedded image information in a host of practical directions Looks at how ubiquitous computing can eliminate traffic congestion and improve the efficiency and quality of medical care Looks at how computing is personalizing learning environments and revolutionizing our approach to the three R's. While these pages serve as a timely reference for researchers working in all areas of product development and human computer interaction, they also provide engineers, doctors, and many other professionals, as well as educators and graduate students with a view that reveals the otherwise invisible seams of this age of ubi-media computing.

The Useful Book of Gadgets - Solving Life's Little Problems, One Gadget at a TIme (Paperback, 2nd New edition): Martin... The Useful Book of Gadgets - Solving Life's Little Problems, One Gadget at a TIme (Paperback, 2nd New edition)
Martin Bailey
R391 Discovery Miles 3 910 Ships in 12 - 17 working days

Does it sometimes seem that everyone else is doing 'smarter' things on their smartphones than you? Do you feel you're not taking full advantage of some of the amazing technology available today, or perhaps just don't know that it even exists? Martin Bailey's latest book aims to solve life's little problems, one gadget at a time. Including hardware tech, PC/Mac software and mobile apps, it's laid out in an easy-to-read, concise format with each item covering two pages. It's written in plain English too, with illustrations and links to where you can find out more information. Covering over 100 gadgets, whether you're looking to improve your golf game, fix your PC and fill it with free software, measure a room using your phone or even alter your state of mind without drink or drugs, The Useful Book of Gadgets, Gizmos & Apps has something for everyone.

Cybercrime and its victims (Hardcover): Elena Martellozzo, Emma Jane Cybercrime and its victims (Hardcover)
Elena Martellozzo, Emma Jane
R4,155 Discovery Miles 41 550 Ships in 12 - 17 working days

The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of waking life in online spaces. While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident. Cybercrime and its victims explores the social construction of violence and victimisation in online spaces and brings together scholars from many areas of inquiry, including criminology, sociology, and cultural, media, and gender studies. The book is organised thematically into five parts. Part one addresses some broad conceptual and theoretical issues. Part two is concerned with issues relating to sexual violence, abuse, and exploitation, as well as to sexual expression online. Part three addresses issues related to race and culture. Part four addresses concerns around cyberbullying and online suicide, grouped together as 'social violence'. The final part argues that victims of cybercrime are, in general, neglected and not receiving the recognition and support they need and deserve. It concludes that in the volatile and complex world of cyberspace continued awareness-raising is essential for bringing attention to the plight of victims. It also argues that there needs to be more support of all kinds for victims, as well as an increase in the exposure and punishment of perpetrators. Drawing on a range of pressing contemporary issues such as online grooming, sexting, cyber-hate, cyber-bulling and online radicalization, this book examines how cyberspace makes us more vulnerable to crime and violence, how it gives rise to new forms of surveillance and social control and how cybercrime can be prevented.

Cyber Frauds, Scams and their Victims (Hardcover): Mark Button, Cassandra Cross Cyber Frauds, Scams and their Victims (Hardcover)
Mark Button, Cassandra Cross
R4,148 Discovery Miles 41 480 Ships in 12 - 17 working days

Crime is undergoing a metamorphosis. The online technological revolution has created new opportunities for a wide variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally committed in an offline environment are increasingly being transitioned to an online environment. This book takes a case study-based approach to exploring the types, perpetrators and victims of cyber frauds. Topics covered include: An in-depth breakdown of the most common types of cyber fraud and scams. The victim selection techniques and perpetration strategies of fraudsters. An exploration of the impact of fraud upon victims and best practice examples of support systems for victims. Current approaches for policing, punishing and preventing cyber frauds and scams. This book argues for a greater need to understand and respond to cyber fraud and scams in a more effective and victim-centred manner. It explores the victim-blaming discourse, before moving on to examine the structures of support in place to assist victims, noting some of the interesting initiatives from around the world and the emerging strategies to counter this problem. This book is essential reading for students and researchers engaged in cyber crime, victimology and international fraud.

Building in Security at Agile Speed (Hardcover): James Ransome, Brook Schoenfield Building in Security at Agile Speed (Hardcover)
James Ransome, Brook Schoenfield
R1,918 Discovery Miles 19 180 Ships in 12 - 17 working days

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. -Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. -Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. -George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today's technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R449 Discovery Miles 4 490
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,266 Discovery Miles 22 660
Social Media Marketing - A Quickstudy…
Edwards Poster R226 Discovery Miles 2 260
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R350 R273 Discovery Miles 2 730
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110
E-Commerce In South Africa
Adheesh Budree Paperback R403 R355 Discovery Miles 3 550
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,483 Discovery Miles 64 830
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R175 Discovery Miles 1 750
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000

 

Partners