0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (9)
  • R100 - R250 (385)
  • R250 - R500 (1,133)
  • R500+ (11,176)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing

Delivering Data Analytics - A Step-By-Step Guide to Driving Adoption of Business Intelligence from Planning to Launch... Delivering Data Analytics - A Step-By-Step Guide to Driving Adoption of Business Intelligence from Planning to Launch (Paperback)
Nicholas Kelly
R1,004 Discovery Miles 10 040 Ships in 12 - 17 working days

The importance of data analytics is well known, but how can you get end users to engage with analytics and business intelligence (BI) when adoption of new technology can be frustratingly slow or may not happen at all? Avoid wasting time on dashboards and reports that no one uses with this practical guide to increasing analytics adoption by focusing on people and process, not technology. Pulling together agile, UX and change management principles, Delivering Data Analytics outlines a step-by-step, technology agnostic process designed to shift the organizational data culture and gain buy-in from users and stakeholders at every stage of the project. This book outlines how to succeed and build trust with stakeholders amid the politics, ambiguity and lack of engagement in business. With case studies, templates, checklists and scripts based on the author's considerable experience in analytics and data visualisation, this book covers the full cycle from requirements gathering and data assessment to training and launch. Ensure lasting adoption, trust and, most importantly, actionable business value with this roadmap to creating user-centric analytics projects.

Twenty-Five Centuries of Technological Change - An Historical Survey (Paperback): J. Mokyr Twenty-Five Centuries of Technological Change - An Historical Survey (Paperback)
J. Mokyr
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

Mokyr provides a long term perspective on the economic impact of technological change, surveying developments in production technologies between 500 BC and 1914.

100 Top Tips - Create Your Smart Home to Stay Safe and Save Money (Paperback): Nick Vandome 100 Top Tips - Create Your Smart Home to Stay Safe and Save Money (Paperback)
Nick Vandome
R156 Discovery Miles 1 560 Ships in 12 - 17 working days
Information Society and the Workplace - Spaces, Boundaries and Agency (Paperback): Prof Jeff Hearn, Tuula Heiskanen Information Society and the Workplace - Spaces, Boundaries and Agency (Paperback)
Prof Jeff Hearn, Tuula Heiskanen
R1,413 Discovery Miles 14 130 Ships in 12 - 17 working days

Much has been written on the grand prospects for "Information Society"; much less on what this might mean in everyday terms. So what do we find when we look at what is happening in a society, Finland, that is one of closest to an information society? Bringing together studies of everyday local practices in workplaces within information society, this book has a special focus on social space and the agency of actors. It includes both theoretical reviews and detailed qualitative research. It also highlights the political challenges of the information society, challenges which are likely to become subjects of international concern.

Designing with the Mind in Mind - Simple Guide to Understanding User Interface Design Guidelines (Paperback, 3rd edition): Jeff... Designing with the Mind in Mind - Simple Guide to Understanding User Interface Design Guidelines (Paperback, 3rd edition)
Jeff Johnson
R1,286 Discovery Miles 12 860 Ships in 12 - 17 working days

User interface (UI) design rules and guidelines, developed by early HCI gurus and recognized throughout the field, were based on cognitive psychology (study of mental processes such as problem solving, memory, and language), and early practitioners were well informed of its tenets. But today practitioners with backgrounds in cognitive psychology are a minority, as user interface designers and developers enter the field from a wide array of disciplines. HCI practitioners today have enough experience in UI design that they have been exposed to UI design rules, but it is essential that they understand the psychological basis behind the rules in order to effectively apply them. In Designing with the Mind in Mind, best-selling author Jeff Johnson provides designers with just enough background in perceptual and cognitive psychology that UI design guidelines make intuitive sense rather than being just a list of rules to follow.

Cyberculture Theorists - Manuel Castells and Donna Haraway (Paperback, New Ed): David Bell Cyberculture Theorists - Manuel Castells and Donna Haraway (Paperback, New Ed)
David Bell; Series edited by Robert Eaglestone
R675 Discovery Miles 6 750 Ships in 12 - 17 working days

This book surveys a 'cluster' of works that seek to explore the cultures of cyberspace, the Internet and the information society. It introduces key ideas, and includes detailed discussion of the work of two key thinkers in this area, Manuel Castells and Donna Haraway, as well as outlining the development of cyberculture studies as a field. To do this, the book also explores selected 'moments' in this development, from the early 1990s, when cyberspace and cyberculture were only just beginning to come together as ideas, up to the present day, when the field of cyberculture studies has grown and bloomed, producing innovative theoretical and empirical work from a diversity of standpoints. Key topics include:


  • life on the screen

  • network society

  • space of flows

  • cyborg methods.

Cyberculture Theorists is the ideal starting point for anyone wanting to understand how to theorise cyberculture in all its myriad forms.

Influencing Health - A Comprehensive Guide to Working with Online Influencers (Hardcover): Amelia Burke-Garcia Influencing Health - A Comprehensive Guide to Working with Online Influencers (Hardcover)
Amelia Burke-Garcia
R4,142 Discovery Miles 41 420 Ships in 12 - 17 working days

The U.S., and countries around the globe, are facing an ever-evolving series of health issues, including obesity, food deserts, child hunger, poor maternal health outcomes, and the resurgence of communicable diseases. Traditionally, health communicators and marketers have talked about these issues in a vacuum, in which related information is only visible when people are specifically seeking it out. If we are to give global health the attention it deserves, we need to weave it into our everyday conversations and experiences. Ultimately, we need to normalize the conversation around health. The emergence of everyday online opinion leaders has created a whole new market for shifting consumer perceptions and behaviors. In fact, many of these everyday online opinion leaders, called influencers, have built such large-scale social media presences that they now have the voice, the platform, and the following to reach millions of people with personal points of view on any number of topics. There are great opportunities for engaging with online influencers to support health promotion programs. However, navigating this online community is new to many people. Understanding how this online community works, the opportunities for paid and unpaid engagements, and the value that health programs specifically have with this community, is paramount to successfully working with influencers. This book draws from research with over 400 online influencers, the latest industry data, and practical, real-world experiences working with influencers over the past ten years. An easy-to-read guidebook for marketers and health communicators alike, this book leverages storytelling as a means for sharing lessons-learned and providing readers with practical knowledge about the online marketing industry and influencer community, as they relate to health.

Statistics and Data Visualisation with Python (Paperback): Jesus Rogel-Salazar Statistics and Data Visualisation with Python (Paperback)
Jesus Rogel-Salazar
R1,450 Discovery Miles 14 500 Ships in 9 - 15 working days

* Targests readers with a background in programming, interested in an introduction/refresher in statistical hypothesis testing * Uses Python throughout * Provides the reader with the opportunity of using the book whenever needed rather than following a sequential path.

Machines That Become Us - The Social Context of Personal Communication Technology (Paperback, New edition): James E. Katz Machines That Become Us - The Social Context of Personal Communication Technology (Paperback, New edition)
James E. Katz
R1,487 Discovery Miles 14 870 Ships in 12 - 17 working days

Social critics and artificial intelligence experts have long prophesized that computers and robots would soon relegate humans to the dustbin of history. Many among the general population seem to have shared this fear of a dehumanized future. But how are people in the twenty-first century actually reacting to the ever-expanding array of gadgets and networks at their disposal? Is computer anxiety a significant problem, paralyzing and terrorizing millions, or are ever-proliferating numbers of gadgets being enthusiastically embraced? Machines that Become Us explores the increasingly intimate relationship between people and their personal communication technologies.

In the first book of its kind, internationally recognized scholars from the United States and Europe explore this topic. Among the technologies analyzed include the Internet, personal digital assistants (PDAs), mobile phones, networked homes, "smart" fabrics and wearable computers, interactive location badges, and implanted monitoring devices. The authors discuss critical policy issues, such as the problems of information resource access and equity, and the recently discovered "digital dropouts" phenomena.

The use of the word "become" in the book's title has three different meanings. The first suggests how people use these technologies to broaden their abilities to communicate and to represent themselves to others. Thus the technologies "become" extensions and representatives of the communicators. A second sense of "become" applies to analysis of the way these technologies become physically integrated with the user's clothing and even their bodies. Finally, contributors examine fashion aspects and uses of these technologies, that is, how they are used in ways becoming to the wearer. The conclusions of many chapters are supported by data, including ethnographic observations, attitude surveys and case studies from the United States, Britain, France, Italy, Finland, and Norway. This approach is especially valuable given the dearth of empirical studies in a field that has been traditionally dominated by extrapolation and speculation, and that has focused on possible future states rather than analysis of current situations. Other chapters are integrative, seeking to advance emerging theoretical perspectives.

This exciting volume generates new insights concerning the burgeoning electronic confusion that increasingly penetrates and blurs the boundaries of various spheres of life in modern society. Machines That Become Us will be of interest to students of communications and technology, sociologists, and social psychologists.

Managing Trust in Cyberspace (Paperback): Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Managing Trust in Cyberspace (Paperback)
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
R1,838 Discovery Miles 18 380 Ships in 12 - 17 working days

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,742 Discovery Miles 17 420 Ships in 12 - 17 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Criminal Futures - Predictive Policing and Everyday Police Work (Paperback): Simon Egbert, Matthias Leese Criminal Futures - Predictive Policing and Everyday Police Work (Paperback)
Simon Egbert, Matthias Leese
R1,268 Discovery Miles 12 680 Ships in 9 - 15 working days

This book explores how predictive policing transforms police work. Police departments around the world have started to use data-driven applications to produce crime forecasts and intervene into the future through targeted prevention measures. Based on three years of field research in Germany and Switzerland, this book provides a theoretically sophisticated and empirically detailed account of how the police produce and act upon criminal futures as part of their everyday work practices. The authors argue that predictive policing must not be analyzed as an isolated technological artifact, but as part of a larger sociotechnical system that is embedded in organizational structures and occupational cultures. The book highlights how, for crime prediction software to come to matter and play a role in more efficient and targeted police work, several translation processes are needed to align human and nonhuman actors across different divisions of police work. Police work is a key function for the production and maintenance of public order, but it can also discriminate, exclude, and violate civil liberties and human rights. When criminal futures come into being in the form of algorithmically produced risk estimates, this can have wide-ranging consequences. Building on empirical findings, the book presents a number of practical recommendations for the prudent use of algorithmic analysis tools in police work that will speak to the protection of civil liberties and human rights as much as they will speak to the professional needs of police organizations. An accessible and compelling read, this book will appeal to students and scholars of criminology, sociology, and cultural studies as well as to police practitioners and civil liberties advocates, in addition to all those who are interested in how to implement reasonable forms of data-driven policing.

Open Government in a Theoretical and Practical Context (Hardcover, New Ed): Michael Hunt Open Government in a Theoretical and Practical Context (Hardcover, New Ed)
Michael Hunt; Edited by Richard A. Chapman
R1,760 Discovery Miles 17 600 Ships in 10 - 15 working days

Combining a stimulating blend of academic authority and senior practitioner experience, this book tackles the principle of openness to official documentation and information flow. It covers important areas such as the Hutton Report into the death of Dr David Kelly, the freedom of speech in democratic societies, the value of the freedom of information and international comparisons. The book is a must read for courses on public policy and governance and information law.

Technically Wrong - Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech (Paperback): Sara Wachter-Boettcher Technically Wrong - Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech (Paperback)
Sara Wachter-Boettcher
R384 Discovery Miles 3 840 Ships in 9 - 15 working days

Buying groceries, tracking our health, finding a date: whatever we want to do, odds are that we can now do it online. But few of us ask how all these digital products are designed or why. It's time we changed that. Many of the services we rely on are full of oversights, biases and downright ethical nightmares. Chatbots that harass women. Sign-up forms that fail anyone who's not straight. Social media sites that send messages about dead relatives. Algorithms that put more black people behind bars. Technically Wrong takes an unflinching look at the values, processes and assumptions that lead to these problems and more. Wachter-Boettcher demystifies the tech industry, leaving those of us on the other side of the screen better prepared to make informed choices about the services we use-and demand more from the companies behind them.

Cybercrime - Key Issues and Debates (Hardcover, 2nd edition): Alisdair A. Gillespie Cybercrime - Key Issues and Debates (Hardcover, 2nd edition)
Alisdair A. Gillespie
R5,513 Discovery Miles 55 130 Ships in 12 - 17 working days

Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.

Cyber Enigma - Unravelling the Terror in the Cyber World (Hardcover): E Dilipraj Cyber Enigma - Unravelling the Terror in the Cyber World (Hardcover)
E Dilipraj
R4,134 Discovery Miles 41 340 Ships in 12 - 17 working days

Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka

Advances in Digital Forensics XVII - 17th IFIP WG 11.9 International Conference, Virtual Event, February 1-2, 2021, Revised... Advances in Digital Forensics XVII - 17th IFIP WG 11.9 International Conference, Virtual Event, February 1-2, 2021, Revised Selected Papers (Hardcover, 1st ed. 2021)
Gilbert Peterson, Sujeet Shenoi
R3,162 Discovery Miles 31 620 Ships in 12 - 17 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems.Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held virtually in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Amazon Web Services in Action, 2E (Paperback, 2nd edition): Michael Wittig, Andreas Wittig Amazon Web Services in Action, 2E (Paperback, 2nd edition)
Michael Wittig, Andreas Wittig
R1,228 Discovery Miles 12 280 Ships in 12 - 17 working days

Description Fully updated to include the latest revisions and updates to AWS; this new edition also offers three new chapters covering the latest additions to the AWS platform: serverless infrastructure automation with AWS Lambda, sharing data volumes between machines with EFS, and caching data in memory with ElastiCache! Amazon Web Services in Action, Second Edition is a comprehensive introduction to computing, storing, and networking in the AWS cloud. Readers will find clear, relevant coverage of all the essential AWS services they need to know, emphasizing best practices for security, high availability and scalability. Key features * Hands-on guide * Practical examples * Step-by-step instructions Audience Written for developers and DevOps engineers moving distributed applications to the AWS platform. About the technology AWS is known as a cloud computing platform. Cloud computing, or the cloud, is a metaphor for supply and consumption of IT resources. The IT resources in the cloud aren't directly visible to the user; there are layers of abstraction in between.

Congressional Communication in the Digital Age (Paperback): Jocelyn Evans, Jessica M. Hayden Congressional Communication in the Digital Age (Paperback)
Jocelyn Evans, Jessica M. Hayden
R1,461 Discovery Miles 14 610 Ships in 12 - 17 working days

Communication defines political representation. At the core of the representational relationship lies the interaction between principal and agent; the quality of this relationship is predicated upon the accessibility of effective channels of communication between the constituent and representative. Over the past decade, congressional websites have become the primary way constituents communicate with their members and a prominent place for members to communicate with constituents. Yet, as we move toward the third decade of the 21st century, little work has systematically analyzed this forum as a distinct representational space. In this book, Jocelyn Evans and Jessica Hayden offer a fresh, timely, and mixed-methods approach for understanding how the emergence of virtual offices has changed the representational relationship between constituents and members of Congress. Utilizing strong theoretical foundations, a broad historical perspective, elite interviews, and rich original datasets, Evans and Hayden present evidence that virtual offices operate as a distinct representational space, and they demonstrate that their use has resulted in unprecedented and ill-understood changes in representational behavior. Congressional Communication in the Digital Age contributes to the scholarship on representation theory and its application to the contemporary Congress. It is valuable reading for students and researchers interested in American politics, political communication, and legislative politics.

Unleashing the Power of 5GtoB in Industries (Hardcover, 1st ed. 2021): Pengfei Sun Unleashing the Power of 5GtoB in Industries (Hardcover, 1st ed. 2021)
Pengfei Sun
R2,890 Discovery Miles 28 900 Ships in 12 - 17 working days

This book will delve into how new ICTs, represented by 5G, collectively empower industries from the perspective of theories and practices. 5G is integrating with cloud, intelligence, big data, and applications to push the boundaries of industries and diversify industrial services. Starting from the background and value of industry digitalization, Section I introduces the new ICT infrastructure for industry digitalization, as well as a new support system based on this infrastructure to enable 5GtoB to bring new value to industries. Section II summarizes the success factors and four key capabilities for achieving 5GtoB success from methodological perspective. Abundant application cases are provided in Section III to explore the adoption of 5GtoB in key enterprises across industries, as well as the benefits brought to these enterprises. The final section analyzes the future evolution and applications of 5GtoB. 5G enables a plethora of possibilities. We believe that this book will inspire everyone in the 5GtoB industry chain to embrace 5GtoB and take the digital transformation of industries to new heights.

Cyber Victimology - Decoding Cyber-Crime Victimisation (Hardcover): Debarati Halder Cyber Victimology - Decoding Cyber-Crime Victimisation (Hardcover)
Debarati Halder
R4,128 Discovery Miles 41 280 Ships in 12 - 17 working days

Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem

Our Digital Rights to the City (Paperback): Joe Shaw, Mark Graham Our Digital Rights to the City (Paperback)
Joe Shaw, Mark Graham
R201 Discovery Miles 2 010 Ships in 9 - 15 working days
Usability Testing Essentials: Ready, Set ...Test! (Paperback, 2nd edition): Carol M. Barnum Usability Testing Essentials: Ready, Set ...Test! (Paperback, 2nd edition)
Carol M. Barnum
R1,422 Discovery Miles 14 220 Ships in 12 - 17 working days

Usability Testing Essentials presents a practical, step-by-step approach to learning the entire process of planning and conducting a usability test. It explains how to analyze and apply the results and what to do when confronted with budgetary and time restrictions. This is the ideal book for anyone involved in usability or user-centered design-from students to seasoned professionals. Filled with new examples and case studies, Usability Testing Essentials, Second Edition is completely updated to reflect the latest approaches, tools and techniques needed to begin usability testing or to advance in this area.

CEH Certified Ethical Hacker Bundle, Fifth Edition (Mixed media product, 5th edition): Matt Walker CEH Certified Ethical Hacker Bundle, Fifth Edition (Mixed media product, 5th edition)
Matt Walker
R1,070 Discovery Miles 10 700 Ships in 12 - 17 working days

Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions. This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what they've learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams. This edition features up-to-date coverage of all nine domains of the CEH v11 exam and the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaingin access and clearing tracks. In all, the bundle includes more than 900 accurate questions with detailed answer explanations Online content includes test engine that provides full-length practice exams and customizable quizzes by chapter or exam domain This bundle is 33% cheaper than buying the two books separately

Cryptology - Classical and Modern (Paperback, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Paperback, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R1,423 Discovery Miles 14 230 Ships in 9 - 15 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Misbelief - What Makes Rational People…
Dan Ariely Paperback R410 R320 Discovery Miles 3 200
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R270 R175 Discovery Miles 1 750
Social Media Marketing - A Quickstudy…
Edwards Poster R226 Discovery Miles 2 260
WFH: Working From Home - How To Build A…
Harriet Minter Paperback R355 R280 Discovery Miles 2 800
Squishmallows Official Collectors' Guide
Squishmallows Hardcover R343 Discovery Miles 3 430
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
E-Commerce In South Africa
Adheesh Budree Paperback R403 R325 Discovery Miles 3 250
Novel Beings - Regulatory Approaches for…
David R. Lawrence, Sarah Morley Hardcover R3,213 Discovery Miles 32 130
Very Bad People - The Inside Story Of…
Patrick Alley Paperback  (1)
R449 Discovery Miles 4 490
Financial Regulation and Technology - A…
Iain Sheridan Hardcover R3,986 Discovery Miles 39 860

 

Partners