0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (11)
  • -
Status
Brand

Showing 1 - 18 of 18 matches in All Departments

Practical Internet Security (Hardcover, 2007 ed.): John R Vacca Practical Internet Security (Hardcover, 2007 ed.)
John R Vacca
R3,027 Discovery Miles 30 270 Ships in 10 - 15 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Guide to Wireless Network Security (Hardcover, 2006 ed.): John R Vacca Guide to Wireless Network Security (Hardcover, 2006 ed.)
John R Vacca
R5,181 R4,834 Discovery Miles 48 340 Save R347 (7%) Ships in 12 - 19 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability.
From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Smart Cities Policies and Financing - Approaches and Solutions (Paperback): John R Vacca Smart Cities Policies and Financing - Approaches and Solutions (Paperback)
John R Vacca
R3,223 Discovery Miles 32 230 Ships in 12 - 19 working days

Smart Cities Policies and Financing: Approaches and Solutions is the definitive professional reference for harnessing the full potential of policy making and financial planning in smart cities. It covers the effective tools for capturing the dynamic relations between people, policies, financing, and environments, and where they are most often useful and effective for all relevant stakeholders. The book examines the key role of science, technology, and innovation (STI) - especially in information and communications technologies - in the design, development, and management of smart cities policies and financing. It identifies the problems and offers practical solutions in implementation of smart infrastructure policies and financing. Smart Cities Policies and Financing is also about how the implementation of smart infrastructure projects (related to the challenges of the lack of financing and the application of suitable policies) underlines the key roles of science, technology and innovation (STI) communities in addressing these challenges and provides key policies and financing that will help guide the design and development of smart cities.

Handbook of Sensor Networking - Advanced Technologies and Applications (Paperback): John R Vacca Handbook of Sensor Networking - Advanced Technologies and Applications (Paperback)
John R Vacca
R1,358 R890 Discovery Miles 8 900 Save R468 (34%) Ships in 9 - 17 working days

The Most Complete and Up-to-Date Account of Advanced Sensor Networking Technologies Handbook of Sensor Networking: Advanced Technologies and Applications provides a complete professional reference and practitioner's guide to today's advanced sensor networking technologies. The handbook focuses on both established and recent sensor networking theory, technology, and practice. Specialists at the forefront of the field address immediate and long-term challenges in their respective areas of expertise and explore practical solutions to a wide range of sensor networking issues. This comprehensive handbook is suitable for a range of readers, including researchers and practitioners, upper-division undergraduate and graduate students, sensor networking technologists and engineers, and security, law enforcement, and governmental agencies. The book gives readers a thorough understanding of the hardware of sensor networks, wireless communication protocols, sensor networks software and architectures, wireless information networks, data manipulation, signal processing, localization, and object tracking through sensor networks.

Online Terrorist Propaganda, Recruitment, and Radicalization (Paperback): John R Vacca Online Terrorist Propaganda, Recruitment, and Radicalization (Paperback)
John R Vacca
R2,252 Discovery Miles 22 520 Ships in 12 - 19 working days

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

Security in the Private Cloud (Paperback): John R Vacca Security in the Private Cloud (Paperback)
John R Vacca
R1,550 Discovery Miles 15 500 Ships in 12 - 19 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Public Key Infrastructure - Building Trusted Applications and Web Services (Paperback): John R Vacca Public Key Infrastructure - Building Trusted Applications and Web Services (Paperback)
John R Vacca
R1,893 Discovery Miles 18 930 Ships in 12 - 19 working days

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.

Cloud Computing Security - Foundations and Challenges (Hardcover, 2nd edition): John R Vacca Cloud Computing Security - Foundations and Challenges (Hardcover, 2nd edition)
John R Vacca
R3,924 Discovery Miles 39 240 Ships in 12 - 19 working days

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features * Covers patching and configuration vulnerabilities of a cloud server * Evaluates methods for data encryption and long-term storage in a cloud server * Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

Handbook of Sensor Networking - Advanced Technologies and Applications (Hardcover): John R Vacca Handbook of Sensor Networking - Advanced Technologies and Applications (Hardcover)
John R Vacca
R4,510 Discovery Miles 45 100 Ships in 12 - 19 working days

The Most Complete and Up-to-Date Account of Advanced Sensor Networking Technologies Handbook of Sensor Networking: Advanced Technologies and Applications provides a complete professional reference and practitioner's guide to today's advanced sensor networking technologies. The handbook focuses on both established and recent sensor networking theory, technology, and practice. Specialists at the forefront of the field address immediate and long-term challenges in their respective areas of expertise and explore practical solutions to a wide range of sensor networking issues. This comprehensive handbook is suitable for a range of readers, including researchers and practitioners, upper-division undergraduate and graduate students, sensor networking technologists and engineers, and security, law enforcement, and governmental agencies. The book gives readers a thorough understanding of the hardware of sensor networks, wireless communication protocols, sensor networks software and architectures, wireless information networks, data manipulation, signal processing, localization, and object tracking through sensor networks.

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,580 Discovery Miles 45 800 Ships in 10 - 15 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Online Terrorist Propaganda, Recruitment, and Radicalization (Hardcover): John R Vacca Online Terrorist Propaganda, Recruitment, and Radicalization (Hardcover)
John R Vacca
R3,775 Discovery Miles 37 750 Ships in 12 - 19 working days

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

Practical Internet Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): John R Vacca Practical Internet Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
John R Vacca
R2,989 Discovery Miles 29 890 Ships in 10 - 15 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Cloud Computing Security - Foundations and Challenges (Paperback, 2nd edition): John R Vacca Cloud Computing Security - Foundations and Challenges (Paperback, 2nd edition)
John R Vacca
R2,043 Discovery Miles 20 430 Ships in 12 - 19 working days

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features * Covers patching and configuration vulnerabilities of a cloud server * Evaluates methods for data encryption and long-term storage in a cloud server * Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

Nanoscale Networking and Communications Handbook (Hardcover): John R Vacca Nanoscale Networking and Communications Handbook (Hardcover)
John R Vacca
R4,670 Discovery Miles 46 700 Ships in 12 - 19 working days

This comprehensive handbook serves as a professional reference as well as a practitioner's guide to today's most complete and concise view of nanoscale networking and communications. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies and recent advancements. It explores practical solutions to a wide range of nanoscale networking and communications issues. Individual chapters, authored by leading experts in the field, address the immediate and long-term challenges in the authors' respective areas of expertise. Key Features Identifies the main differences between nanonetworks and classical wireless networks and explains how to leverage those to develop new communication techniques for nanonetworks Presents the different alternatives for network communication among nanomachines, whether these are nanomaterial-based devices or genetically modified cells Provides a framework that will stimulate vision for a family of technologies in nanonetworking communications and multi-scale integration

Wireless Data Demystified (Paperback, Ed): John R Vacca Wireless Data Demystified (Paperback, Ed)
John R Vacca
R1,512 R1,258 Discovery Miles 12 580 Save R254 (17%) Ships in 10 - 15 working days

UNDERSTAND WIRELESS DATA COMPLETELY, EASILY WITH WIRELESS DATA DEMYSTIFIED


Wireless subscribers are up, but revenue per subscriber isn’t – and it isn’t going to be unless wireless service providers can provide more than plain-vanilla voice services. The road to successful deployment of data services has been difficult, but it is essential if the industry is going to survive. This book takes you inside the data services that will – one way or another – transform the wireless industry.


John R. Vacca wrote the book on wireless data, literally: His Wireless Broadband Networks Handbook is the field’s standard professional reference. Now, in Wireless Data Demystified, he offers a book anyone can understand—without being a certified technical expert. And if you are a technical expert, you will find here the essentials you need, without wading through hundreds of pages of technical detail.


You must read this book if—

* understanding wireless data technologies and their future is your career

* you want a sightline on interlinked wireless data technologies – and a realistic timeline on what’s really happening now

* wireless e-mail, e-commerce, audio, video, stock quotes, information retrieval, and other subscriber services are part of your plan for the future

* networks, technologies, and the protocols that deliver wireless data services are your responsibility

* making the move from straight wireless voice services to data is your company’s survival strategy – or should be

* basic network design and deployment concepts, clearly explained, could put you ahead of the pack

* implementing fixed wireless or WLL (wireless local loop) is a service possibility

* you’re a network manager, administrator, or technician, or work in wireless sales or marketing

* you can see past the troubled present to future investment potential of wireless data


Transmitting wireless data will be a $7.5 billion-a-year business by 2005, industry analysts predict. This book unpacks wireless data essentials to position you to take advantage of this difficult but fast-growing market.

Firewalls - Jumpstart for Network and Systems Administrators (Paperback): John R Vacca, Scott Ellis Firewalls - Jumpstart for Network and Systems Administrators (Paperback)
John R Vacca, Scott Ellis
R2,584 Discovery Miles 25 840 Ships in 10 - 15 working days

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.
-Install and configure proxy-based and stateful-filtering firewalls
-Protect internal IP addresses with NAT and deploy a secure DNS architecture
-Develop an Internet/intranet security policy to protect your organization's systems and data
-Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures

I-mode Crash Course (Paperback): John R Vacca I-mode Crash Course (Paperback)
John R Vacca
R1,070 R920 Discovery Miles 9 200 Save R150 (14%) Ships in 10 - 15 working days

Insider details on the world’s most successful wireless Internet application


The wireless Internet service that dominates the Japanese market is coming to the United States and Europe. i-mode Crash Course helps you prepare, whether your interest is technical or financial…whether you’re offering the killer app or competing against it…even if you’re simply a consumer who wants to get on top of the latest technology. Author John Vacca’s big-picture focus includes installation, deployment and configuration. He provides the insights you need to analyze markets, predict results, and influence outcomes. Learn:


  • How i-mode connects cell phones and other handhelds to the Internet for instant messaging, email, online shopping, real-time news, stocks, weather reports, and more
  • Why i-mode beat out WAP
  • Development secrets behind i-mode applications and the advantages of cHTML
  • The Japanese market strategy and plans to take America and Europe this year

Security in the Private Cloud (Hardcover): John R Vacca Security in the Private Cloud (Hardcover)
John R Vacca
R4,204 Discovery Miles 42 040 Ships in 12 - 19 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Research on…
Sahver Omeraki Cekirdekci, OEzlem Ingun Karkis, … Hardcover R7,211 Discovery Miles 72 110
Advances in Atomic, Molecular, and…
Susanne F Yelin, Louis F. DiMauro, … Hardcover R7,334 R6,131 Discovery Miles 61 310
Nurse Executive - Review and Resource…
Al Rundio, Virginia Wilson Paperback R2,870 Discovery Miles 28 700
Scientific Computing in Electrical…
Martijn van Beurden, Neil Budko, … Hardcover R2,915 Discovery Miles 29 150
The Princess And The Sangoma - Kwasuka…
Dean White, Charles Siboto Paperback R190 R159 Discovery Miles 1 590
Prophets in the Qur'ān and the Bible
Daniel S Baeq, Sam Kim Hardcover R1,050 R890 Discovery Miles 8 900
Discoveries of Medically Themed Media…
Heather A. Stilwell Hardcover R2,143 Discovery Miles 21 430
Supercritical-Pressure Light Water…
Yoshiaki Oka, Hideo Mori Hardcover R4,349 R3,779 Discovery Miles 37 790
Paleomagnetism, Volume 73 - Continents…
Michael W. McElhinny, Phillip L. McFadden Hardcover R1,494 Discovery Miles 14 940
Hybridizing Mission
Peter T Lee Hardcover R1,350 Discovery Miles 13 500

 

Partners