0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Machine Learning for Neuroscience - A Systematic Approach: Chuck Easttom Machine Learning for Neuroscience - A Systematic Approach
Chuck Easttom
R2,660 Discovery Miles 26 600 Ships in 12 - 17 working days

This book addresses the growing need for machine learning and data mining in neuroscience. The book offers a basic overview of the neuroscience, machine learning and the required math and programming necessary to develop reliable working models. The material is presented in a easy to follow user-friendly manner and is replete with fully working machine learning code. Machine Learning for Neuroscience: A Systematic Approach, tackles the needs of neuroscience researchers and practitioners that have very little training relevant to machine learning. The first section of the book provides an overview of necessary topics in order to delve into machine learning, including basic linear algebra and Python programming. The second section provides an overview of neuroscience and is directed to the computer science oriented readers. The section covers neuroanatomy and physiology, cellular neuroscience, neurological disorders and computational neuroscience. The third section of the book then delves into how to apply machine learning and data mining to neuroscience and provides coverage of artificial neural networks (ANN), clustering, and anomaly detection. The book contains fully working code examples with downloadable working code. It also contains lab assignments and quizzes, making it appropriate for use as a textbook. The primary audience is neuroscience researchers who need to delve into machine learning, programmers assigned neuroscience related machine learning projects and students studying methods in computational neuroscience.

An In-Depth Guide to Mobile Device Forensics (Hardcover): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Hardcover)
Chuck Easttom
R3,549 Discovery Miles 35 490 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,441 Discovery Miles 14 410 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

CompTIA Security+ Study Guide with Online Labs - Exam SY0-501 (Paperback, 7th Edition): Emmett Dulaney, Chuck Easttom, James... CompTIA Security+ Study Guide with Online Labs - Exam SY0-501 (Paperback, 7th Edition)
Emmett Dulaney, Chuck Easttom, James Michael. Stewart, S. Russell Christy
R2,222 Discovery Miles 22 220 Out of stock

Expert Security+ SY0-501 exam preparation, endorsed by CompTIA, Now with 25 Online Lab Modules The seventh edition of CompTIA Security+ Study Guide offers invaluable preparation for Exam SY0-501. Written by a team of expert authors, the book covers 100% of the exam objectives with clear and concise explanations. Discover how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while gaining and understanding the role of architecture and design. Spanning topics from everyday tasks like identity and access management to complex subjects such as risk management and cryptography, this study guide helps you consolidate your knowledge base in preparation for the Security+ exam. Illustrative examples show how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for: Managing Risk Designing and Diagnosing Networks Understanding Devices and Infrastructure Identify and Access Management Protecting Wireless Networks Securing the Cloud Data, Privacy, and Security Practices Cryptography and PKI Wiley has partnered up with Practice Labs, the IT Competency Hub, to give IT learners discounted access to their live, virtual Practice Labs. Connect to real devices using actual hardware and software straight from a web browser. Practice Labs allow you to cement your theoretical studies with practical, hands-on experience. Master your IT skills and gain virtual work experience to increase your employability. Each purchase provides 6 months' unlimited access. Ready to practice your IT skills? Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, type in your unique PIN, and instantly gain one year of FREE access to: Interactive test bank with 2 bonus exams and 12 chapter tests. Practice questions help you identify areas where further review is needed. 325 questions total! 100 Electronic Flashcards to reinforce learning and last-minute prep before the exam. Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared. ABOUT THE PRACTICE LABS SECURITY+ LABS So you can practice with hands-on learning in a real environment, Sybex has bundled Practice Labs virtual labs that run from your browser. The registration code is included with the book and gives you 6 months unlimited access to Practice Labs CompTIA Security+ Exam SY0-501 Labs with 25 unique lab modules to practice your skills.

CompTIA Security+ Practice Tests - Exam SY0-501 (Paperback): S. Russell Christy, Chuck Easttom CompTIA Security+ Practice Tests - Exam SY0-501 (Paperback)
S. Russell Christy, Chuck Easttom
R968 R915 Discovery Miles 9 150 Save R53 (5%) Ships in 9 - 15 working days

1,000 Challenging practice questions for Exam SY0-501 CompTIA Security+ Practice Tests provides invaluable practice for candidates preparing for Exam SY0-501. Covering 100% of exam objectives, this book provides 1,000 practice questions to help you test your knowledge and maximize your performance well in advance of exam day. Whether used alone or as a companion to the CompTIA Security+ Study Guide, these questions help reinforce what you know while revealing weak areas while there's still time to review. Six unique practice tests plus one bonus practice exam cover threats, attacks, and vulnerabilities; technologies and tools; architecture and design; identity and access management; risk management; and cryptography and PKI to give you a comprehensive preparation resource. Receive one year of FREE access to the Sybex online interactive learning environment, to help you prepare with superior study tools that allow you to gauge your readiness and avoid surprises on exam day. The CompTIA Security+ certification is internationally-recognized as validation of security knowledge and skills. The exam tests your ability to install and configure secure applications, networks, and devices; analyze, respond to, and mitigate threats; and operate within applicable policies, laws, and regulations. This book provides the practice you need to pass with flying colors. Master all six CompTIA Security+ objective domains Test your knowledge with 1,000 challenging practice questions Identify areas in need of further review Practice test-taking strategies to go into the exam with confidence The job market for information security professionals is thriving, and will only expand as threats become more sophisticated and more numerous. Employers need proof of a candidate's qualifications, and the CompTIA Security+ certification shows that you've mastered security fundamentals in both concept and practice. If you're ready to take on the challenge of defending the world's data, CompTIA Security+ Practice Tests is an essential resource for thorough exam preparation.

The NICE Cyber Security Framework - Cyber Security Management (Hardcover, 1st ed. 2020): Izzat Alsmadi, Chuck Easttom,... The NICE Cyber Security Framework - Cyber Security Management (Hardcover, 1st ed. 2020)
Izzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh
R2,731 Discovery Miles 27 310 Ships in 10 - 15 working days

This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.

The NICE Cyber Security Framework - Cyber Security Management (Paperback, 1st ed. 2020): Izzat Alsmadi, Chuck Easttom,... The NICE Cyber Security Framework - Cyber Security Management (Paperback, 1st ed. 2020)
Izzat Alsmadi, Chuck Easttom, Lo'ai Tawalbeh
R1,623 Discovery Miles 16 230 Ships in 12 - 17 working days

This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.

Quantum Computing Fundamentals (Paperback): William (Chuck) Easttom II Quantum Computing Fundamentals (Paperback)
William (Chuck) Easttom II
R1,537 Discovery Miles 15 370 Ships in 9 - 15 working days

ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTING Clearly explains core concepts, terminology, and techniques Covers the foundational physics, math, and information theory you need Provides hands-on practice with quantum programming The perfect beginner's guide for anyone interested in a quantum computing career Dr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started. Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field's underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their implications for cyber security, and previews advances in quantum-resistant cryptography. Writing clearly and simply, he introduces two of today's leading quantum programming languages, Microsoft Q# and QASM, and guides you through sample projects. Throughout, tests, projects, and review questions help you deepen and apply your knowledge. Whether you're a student, professional, or manager, this guide will prepare you for the quantum computing revolution--and expand your career options, too. Master the linear algebra and other mathematical skills you'll need Explore key physics ideas such as quantum states and uncertainty Review data structures, algorithms, and computing complexity Work with probability and set theory in quantum computing Familiarize yourself with basic quantum theory and formulae Understand quantum entanglement and quantum key distribution Discover how quantum computers are architected and built Explore several leading quantum algorithms Compare quantum and conventional asymmetric algorithms See how quantum computing might break traditional cryptography Discover several approaches to quantum-resistant cryptography Start coding with Q#, Microsoft's quantum programming language Simulate quantum gates and algorithms with QASM

Digital Forensics, Investigation, and Response (Paperback, 4th edition): Chuck Easttom Digital Forensics, Investigation, and Response (Paperback, 4th edition)
Chuck Easttom
R1,849 Discovery Miles 18 490 Ships in 9 - 15 working days

Digital Forensics, Investigation, and Response, Fourth Edition begins by examining the fundamentals of system forensics: what forensics is, an overview of computer crime, the challenges of system forensics, and forensics methods and labs. The second part of this book addresses the tools, techniques, and methods used to perform computer forensics and investigation. These include collecting evidence, investigating information hiding, recovering data, and scrutinizing email. It also discusses how to perform forensics in Windows, Linux, Macintosh operating systems, mobile devices, and networks. Finally, the third part explores incident and intrusion response, emerging technologies and future directions of this field, and additional system forensics resources. Each new print copy includes Navigate eBook Access enabling you to read your digital textbook online or offline from your computer, tablet, or mobile device.

Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition): William (Chuck) Easttom Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition)
William (Chuck) Easttom
R2,158 Discovery Miles 21 580 Ships in 9 - 15 working days

All you need to know about defending networks, in one book * Clearly explains concepts, terminology, challenges, tools, and skills * Covers key security standards and models for business and government * The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career. Learn How To * Evaluate key network risks and dangers * Choose the right network security approach for your organization * Anticipate and counter widespread network attacks, including those based on "social engineering" * Successfully deploy and apply firewalls and intrusion detection systems * Secure network communication with virtual private networks * Protect data with cryptographic public/private key systems, digital signatures, and certificates * Defend against malware, including ransomware, Trojan horses, and spyware * Harden operating systems and keep their security up to date * Define and implement security policies that reduce risk * Explore leading security standards and models, including ISO and NIST standards * Prepare for an investigation if your network has been attacked * &nb

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Kingston Technology DataTraveler Exodia…
 (1)
R106 Discovery Miles 1 060
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Dromex 3-Ply Medical Mask (Box of 50)
 (17)
R1,099 R399 Discovery Miles 3 990
UGreen USBC-40574 USB-C Male To USB-C…
R229 R215 Discovery Miles 2 150
Too Beautiful To Break
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R289 Discovery Miles 2 890
Tenet
John David Washington, Robert Pattinson, … DVD R53 Discovery Miles 530
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Victoria - Season 1
Jenna Coleman, Tom Hughes, … DVD  (3)
R55 Discovery Miles 550

 

Partners