0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (9)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Machine Learning for Neuroscience - A Systematic Approach: Chuck Easttom Machine Learning for Neuroscience - A Systematic Approach
Chuck Easttom
R2,498 Discovery Miles 24 980 Ships in 12 - 17 working days

This book addresses the growing need for machine learning and data mining in neuroscience. The book offers a basic overview of the neuroscience, machine learning and the required math and programming necessary to develop reliable working models. The material is presented in a easy to follow user-friendly manner and is replete with fully working machine learning code. Machine Learning for Neuroscience: A Systematic Approach, tackles the needs of neuroscience researchers and practitioners that have very little training relevant to machine learning. The first section of the book provides an overview of necessary topics in order to delve into machine learning, including basic linear algebra and Python programming. The second section provides an overview of neuroscience and is directed to the computer science oriented readers. The section covers neuroanatomy and physiology, cellular neuroscience, neurological disorders and computational neuroscience. The third section of the book then delves into how to apply machine learning and data mining to neuroscience and provides coverage of artificial neural networks (ANN), clustering, and anomaly detection. The book contains fully working code examples with downloadable working code. It also contains lab assignments and quizzes, making it appropriate for use as a textbook. The primary audience is neuroscience researchers who need to delve into machine learning, programmers assigned neuroscience related machine learning projects and students studying methods in computational neuroscience.

The NICE Cyber Security Framework - Cyber Security Management (Hardcover, 1st ed. 2020): Izzat Alsmadi, Chuck Easttom,... The NICE Cyber Security Framework - Cyber Security Management (Hardcover, 1st ed. 2020)
Izzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh
R2,346 Discovery Miles 23 460 Ships in 12 - 17 working days

This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.

An In-Depth Guide to Mobile Device Forensics (Hardcover): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Hardcover)
Chuck Easttom
R3,329 Discovery Miles 33 290 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition): William (Chuck) Easttom Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition)
William (Chuck) Easttom
R1,960 Discovery Miles 19 600 Ships in 12 - 17 working days

All you need to know about defending networks, in one book * Clearly explains concepts, terminology, challenges, tools, and skills * Covers key security standards and models for business and government * The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career. Learn How To * Evaluate key network risks and dangers * Choose the right network security approach for your organization * Anticipate and counter widespread network attacks, including those based on "social engineering" * Successfully deploy and apply firewalls and intrusion detection systems * Secure network communication with virtual private networks * Protect data with cryptographic public/private key systems, digital signatures, and certificates * Defend against malware, including ransomware, Trojan horses, and spyware * Harden operating systems and keep their security up to date * Define and implement security policies that reduce risk * Explore leading security standards and models, including ISO and NIST standards * Prepare for an investigation if your network has been attacked * &nb

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,354 Discovery Miles 13 540 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

CompTIA Security+ Study Guide with Online Labs - Exam SY0-501 (Paperback, 7th Edition): Emmett Dulaney, Chuck Easttom, James... CompTIA Security+ Study Guide with Online Labs - Exam SY0-501 (Paperback, 7th Edition)
Emmett Dulaney, Chuck Easttom, James Michael. Stewart, S. Russell Christy
R2,137 Discovery Miles 21 370 Out of stock

Expert Security+ SY0-501 exam preparation, endorsed by CompTIA, Now with 25 Online Lab Modules The seventh edition of CompTIA Security+ Study Guide offers invaluable preparation for Exam SY0-501. Written by a team of expert authors, the book covers 100% of the exam objectives with clear and concise explanations. Discover how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while gaining and understanding the role of architecture and design. Spanning topics from everyday tasks like identity and access management to complex subjects such as risk management and cryptography, this study guide helps you consolidate your knowledge base in preparation for the Security+ exam. Illustrative examples show how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for: Managing Risk Designing and Diagnosing Networks Understanding Devices and Infrastructure Identify and Access Management Protecting Wireless Networks Securing the Cloud Data, Privacy, and Security Practices Cryptography and PKI Wiley has partnered up with Practice Labs, the IT Competency Hub, to give IT learners discounted access to their live, virtual Practice Labs. Connect to real devices using actual hardware and software straight from a web browser. Practice Labs allow you to cement your theoretical studies with practical, hands-on experience. Master your IT skills and gain virtual work experience to increase your employability. Each purchase provides 6 months' unlimited access. Ready to practice your IT skills? Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, type in your unique PIN, and instantly gain one year of FREE access to: Interactive test bank with 2 bonus exams and 12 chapter tests. Practice questions help you identify areas where further review is needed. 325 questions total! 100 Electronic Flashcards to reinforce learning and last-minute prep before the exam. Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared. ABOUT THE PRACTICE LABS SECURITY+ LABS So you can practice with hands-on learning in a real environment, Sybex has bundled Practice Labs virtual labs that run from your browser. The registration code is included with the book and gives you 6 months unlimited access to Practice Labs CompTIA Security+ Exam SY0-501 Labs with 25 unique lab modules to practice your skills.

Quantum Computing Fundamentals (Paperback): William (Chuck) Easttom II Quantum Computing Fundamentals (Paperback)
William (Chuck) Easttom II
R1,479 Discovery Miles 14 790 Ships in 9 - 15 working days

ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTING Clearly explains core concepts, terminology, and techniques Covers the foundational physics, math, and information theory you need Provides hands-on practice with quantum programming The perfect beginner's guide for anyone interested in a quantum computing career Dr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started. Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field's underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their implications for cyber security, and previews advances in quantum-resistant cryptography. Writing clearly and simply, he introduces two of today's leading quantum programming languages, Microsoft Q# and QASM, and guides you through sample projects. Throughout, tests, projects, and review questions help you deepen and apply your knowledge. Whether you're a student, professional, or manager, this guide will prepare you for the quantum computing revolution--and expand your career options, too. Master the linear algebra and other mathematical skills you'll need Explore key physics ideas such as quantum states and uncertainty Review data structures, algorithms, and computing complexity Work with probability and set theory in quantum computing Familiarize yourself with basic quantum theory and formulae Understand quantum entanglement and quantum key distribution Discover how quantum computers are architected and built Explore several leading quantum algorithms Compare quantum and conventional asymmetric algorithms See how quantum computing might break traditional cryptography Discover several approaches to quantum-resistant cryptography Start coding with Q#, Microsoft's quantum programming language Simulate quantum gates and algorithms with QASM

The NICE Cyber Security Framework - Cyber Security Management (Paperback, 1st ed. 2020): Izzat Alsmadi, Chuck Easttom,... The NICE Cyber Security Framework - Cyber Security Management (Paperback, 1st ed. 2020)
Izzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh
R1,526 Discovery Miles 15 260 Ships in 12 - 17 working days

This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.

CompTIA Security+ Study Guide - Sy0-401 (Paperback, 6th Edition): Emmett Dulaney, Chuck Easttom CompTIA Security+ Study Guide - Sy0-401 (Paperback, 6th Edition)
Emmett Dulaney, Chuck Easttom
R1,132 R803 Discovery Miles 8 030 Save R329 (29%) Out of stock

Join over 250,000 IT professionals who've earned Security+ certification If you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ exam is one of the most valuable certifications available. Since its introduction in 2002, over a quarter million professionals have achieved Security+ certification, itself a springboard to prestigious certifications like the CASP, CISSP, and CISA. The CompTIA Security+ Study Guide: SY0-401 covers 100% of the Security+ exam objectives, with clear and concise information on crucial security topics. You'll find everything you need to prepare for the 2014 version of the Security+ certification exam, including insight from industry experts on a wide range of IT security topics. Readers also get access to a robust set of learning tools, featuring electronic flashcards, assessment tests, robust practice test environment, with hundreds of practice questions, and electronic flashcards. CompTIA authorized and endorsed Includes updates covering the latest changes to the exam, including better preparation for real-world applications Covers key topics like network security, compliance and operational security, threats and vulnerabilities, access control and identity management, and cryptography Employs practical examples and insights to provide real-world context from two leading certification experts Provides the necessary tools to take that first important step toward advanced security certs like CASP, CISSP, and CISA, in addition to satisfying the DoD's 8570 directive If you're serious about jump-starting your security career, you need the kind of thorough preparation included in the CompTIA Security+ Study Guide: SY0-401.

Digital Forensics, Investigation, and Response (Paperback, 4th edition): Chuck Easttom Digital Forensics, Investigation, and Response (Paperback, 4th edition)
Chuck Easttom
R1,778 Discovery Miles 17 780 Ships in 9 - 15 working days

Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources. Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Folk Of The Air: Trilogy - The Cruel…
Holly Black Paperback  (3)
R648 Discovery Miles 6 480
Wagworld Pet Blankie (Blue) - X Large…
R309 R246 Discovery Miles 2 460
White Glo Floss Charcoal Mint
R50 Discovery Miles 500
Oversized Top & Ribbed Leggings Set…
R599 R249 Discovery Miles 2 490
Angelcare Nappy Bin Refills
R165 R145 Discovery Miles 1 450
Bostik Glue Stick (40g)
R52 Discovery Miles 520
Mellerware Swiss - Plastic Floor Fan…
R369 Discovery Miles 3 690
Ergo Mouse Pad Wrist Rest Support
R399 R349 Discovery Miles 3 490
The Hobbit: The Desolation of Smaug
Martin Freeman, Ian McKellen, … Blu-ray disc  (2)
R77 Discovery Miles 770
Penguin Chalk (White) (Box of 100)
R28 R25 Discovery Miles 250

 

Partners