0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 21 of 21 matches in All Departments

Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback): Michael Cross Social Media Security - Leveraging Social Networking While Mitigating Risk (Paperback)
Michael Cross
R1,162 Discovery Miles 11 620 Ships in 12 - 17 working days

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
Defines an organization's goals for social networkingPresents the risks present in social networking and how to mitigate themExplains how to maintain continuous social networking security"

Google Earth Forensics - Using Google Earth Geo-Location in Digital Forensic Investigations (Paperback): Michael Harrington,... Google Earth Forensics - Using Google Earth Geo-Location in Digital Forensic Investigations (Paperback)
Michael Harrington, Michael Cross
R863 Discovery Miles 8 630 Ships in 12 - 17 working days

"Google Earth Forensics" is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways.

As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools.

Written for investigators and forensic practitioners, "Google Earth Forensics" is written by an investigator and trainer with more than 13 years of experience in law enforcement who will show you how to use this valuable tool anywhere at the crime scene, in the lab, or in the courtroom.
Learn how to extract location-based evidence using the Google Earth program or app on computers and mobile devicesCovers the basics of GPS systems, the usage of Google Earth, and helps sort through data imported from external evidence sourcesIncludes tips on presenting evidence in compelling, easy-to-understand formats

Scene of the Cybercrime (Paperback, 2nd edition): Debra Littlejohn Shinder, Michael Cross Scene of the Cybercrime (Paperback, 2nd edition)
Debra Littlejohn Shinder, Michael Cross
R1,401 Discovery Miles 14 010 Ships in 12 - 17 working days

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard.
Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws.

* Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations.
* Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard
* Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones.

Pattern Formation and Dynamics in Nonequilibrium Systems (Hardcover): Michael Cross, Henry Greenside Pattern Formation and Dynamics in Nonequilibrium Systems (Hardcover)
Michael Cross, Henry Greenside
R2,647 Discovery Miles 26 470 Ships in 12 - 17 working days

Many exciting frontiers of science and engineering require understanding the spatiotemporal properties of sustained nonequilibrium systems such as fluids, plasmas, reacting and diffusing chemicals, crystals solidifying from a melt, heart muscle, and networks of excitable neurons in brains. This introductory textbook for graduate students in biology, chemistry, engineering, mathematics, and physics provides a systematic account of the basic science common to these diverse areas. This book provides a careful pedagogical motivation of key concepts, discusses why diverse nonequilibrium systems often show similar patterns and dynamics, and gives a balanced discussion of the role of experiments, simulation, and analytics. It contains numerous worked examples and over 150 exercises. This book will also interest scientists who want to learn about the experiments, simulations, and theory that explain how complex patterns form in sustained nonequilibrium systems.

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R781 Discovery Miles 7 810 Ships in 12 - 17 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

The Tower (Paperback): Michael Cross The Tower (Paperback)
Michael Cross
bundle available
R273 Discovery Miles 2 730 Ships in 10 - 15 working days
Mission Mayhem (Paperback): Michael Cross Mission Mayhem (Paperback)
Michael Cross
bundle available
R272 Discovery Miles 2 720 Ships in 10 - 15 working days
The Last Inferno (Paperback): Michael Cross The Last Inferno (Paperback)
Michael Cross
bundle available
R277 Discovery Miles 2 770 Ships in 10 - 15 working days
Amnesia (Paperback): Michael Cross Amnesia (Paperback)
Michael Cross
bundle available
R278 Discovery Miles 2 780 Ships in 10 - 15 working days
Web of Lies (Paperback): Michael Cross Web of Lies (Paperback)
Michael Cross
bundle available
R281 Discovery Miles 2 810 Ships in 10 - 15 working days
10 Reasons Girls Never Poop At School (Paperback): Michelle Cross-Frase 10 Reasons Girls Never Poop At School (Paperback)
Michelle Cross-Frase; Mercy N Frase
R325 Discovery Miles 3 250 Ships in 10 - 15 working days
The Importance of Communication - Four Primary Principles for Procuring Your Church's Next Pastor (Paperback): Michael... The Importance of Communication - Four Primary Principles for Procuring Your Church's Next Pastor (Paperback)
Michael Cross
R169 Discovery Miles 1 690 Ships in 10 - 15 working days
The Official Roller Coaster Enthusiast's Ride Log (Paperback): Michelle Cross-Frase The Official Roller Coaster Enthusiast's Ride Log (Paperback)
Michelle Cross-Frase
R306 Discovery Miles 3 060 Ships in 10 - 15 working days
The Geocache Passport Jr. - Ammo Can Edition (Paperback): Michelle Cross-Frase The Geocache Passport Jr. - Ammo Can Edition (Paperback)
Michelle Cross-Frase
R267 Discovery Miles 2 670 Ships in 10 - 15 working days
Open Hearts, Waiting Homes - An Adoption Devotional for Families Preparing to Adopt (Paperback): Michelle Cross-Frase Open Hearts, Waiting Homes - An Adoption Devotional for Families Preparing to Adopt (Paperback)
Michelle Cross-Frase
R306 Discovery Miles 3 060 Ships in 10 - 15 working days
CompTIA Network+ Certification Study Guide: Exam N10-004 - Exam N10-004 2E (Paperback, 2nd edition): Robert Shimonski, Naomi... CompTIA Network+ Certification Study Guide: Exam N10-004 - Exam N10-004 2E (Paperback, 2nd edition)
Robert Shimonski, Naomi Alpern, Michael Cross, Dustin L. Fritz, Mohan Krishnamurthy, …
R2,126 Discovery Miles 21 260 Ships in 10 - 15 working days

CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major update with more focus on security and wireless aspects of networking. Our new study guide has been updated accordingly with focus on network, systems, and WAN security and complete coverage of today's wireless networking standards. As always this companion covers the core Network+ material including basic design principles, management and operation of a network infrastructure, and testing tools. After reading this book not only will you be able to ace the exam but you will be able to maintain, troubleshoot, and install computer networks.

New to this edition are: Intensified focus on network securityTwo NEW practice exams to help eliminate test-day jittersTiered chapter ending quesitons that allow gradual learning
New to this edition in accordance with the newly revised exam is an intensified focus on network securityTwo NEW practice exams to help eliminate test-day jittersTiered chapter ending questions that allow for graduated learningCovers everything from test taking techniques to advanced topics - keeping the beginner and intermediate IT professional in mindLayout of the guide parallels the Network+ N10-004 objectives for ease of study

Rock Grave (Paperback): Michelle Crosse Rock Grave (Paperback)
Michelle Crosse
R465 Discovery Miles 4 650 Ships in 10 - 15 working days

Enter the other night life of Las Vegas. Away form the bright lights of the Strip are the subdued spot lights that cast onto stages for the exotic dancers. It is a reality for the women who work it and men seeking pleasure. There is one man who does not agree with the lifestyle the women are leading. The game of tease and sex can lead to sudden death. It is Byron who is more than happy to take them to their grave. Tom Beckley, twenty year veteran of Metro, finds himself involved in the case and stumbles onto something no one has ever seen before.

Developer's Guide to Web Application Security (Paperback): Michael Cross Developer's Guide to Web Application Security (Paperback)
Michael Cross
R1,493 Discovery Miles 14 930 Ships in 9 - 15 working days

Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential.

* The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 * Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more * The Companion Web site will have downloadable code and scripts presented in the book (http: //www.elsevierdirect.com/v2/companion.jsp?ISBN=9781597490610)

Botnets - The Killer Web Applications (Paperback): Craig Schiller, James R Binkley Botnets - The Killer Web Applications (Paperback)
Craig Schiller, James R Binkley; Contributions by Anthony Bradley, Michael Cross, Gadi Evron, …
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
* This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
* Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure (Paperback): Melissa M. Meyer, Michael Cross,... How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure (Paperback)
Melissa M. Meyer, Michael Cross, Hal Kurz, Brian Barber
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.
The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement.
The next book in our best selling and critically acclaimed How to Cheat series. This is the perfect book for users who have already purchased How to Cheat at Managing Windows 2003 Small Business Server.
* Active Directory is the market leader in the directory services space, and 57% of all Microsoft corporate customers have deployed AD
* Follows Syngress's proven "How To Cheat" methodology
* Companion Web site offers dozens of templates, "Cheat Sheets," and checklists for readers

Jay Dee - Yancey Boys Instrumentals CD (2014) (CD): Jay Dee Jay Dee - Yancey Boys Instrumentals CD (2014) (CD)
Jay Dee; Contributions by Geoff Schroer; Produced by J Dilla, Illa J, Michael Cross; Performed by …
R248 Discovery Miles 2 480 Out of stock
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
JCB Soft Toe Slip On Safety Boot (Desert…
R1,059 Discovery Miles 10 590
Spectra S1 Double Rechargeable Breast…
 (46)
R3,899 R3,679 Discovery Miles 36 790
Large 1680D Boys & Girls Backpack…
R507 Discovery Miles 5 070
Estee Lauder Beautiful Belle Eau De…
R2,241 R1,652 Discovery Miles 16 520
When Love Kills - The Tragic Tale Of AKA…
Melinda Ferguson Paperback R320 R235 Discovery Miles 2 350
Positively Me - Daring To Live And Love…
Nozibele Mayaba, Sue Nyathi Paperback R310 R210 Discovery Miles 2 100
Russell Hobbs Toaster (2 Slice…
R707 Discovery Miles 7 070
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners