0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 18 of 18 matches in All Departments

Practical Internet Security (Hardcover, 2007 ed.): John R Vacca Practical Internet Security (Hardcover, 2007 ed.)
John R Vacca
R2,942 Discovery Miles 29 420 Ships in 10 - 15 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Guide to Wireless Network Security (Hardcover, 2006 ed.): John R Vacca Guide to Wireless Network Security (Hardcover, 2006 ed.)
John R Vacca
R5,078 R4,510 Discovery Miles 45 100 Save R568 (11%) Ships in 12 - 17 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability.
From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Online Terrorist Propaganda, Recruitment, and Radicalization (Paperback): John R Vacca Online Terrorist Propaganda, Recruitment, and Radicalization (Paperback)
John R Vacca
R2,007 Discovery Miles 20 070 Ships in 12 - 17 working days

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

Handbook of Sensor Networking - Advanced Technologies and Applications (Paperback): John R Vacca Handbook of Sensor Networking - Advanced Technologies and Applications (Paperback)
John R Vacca
R1,331 R837 Discovery Miles 8 370 Save R494 (37%) Ships in 9 - 15 working days

The Most Complete and Up-to-Date Account of Advanced Sensor Networking Technologies Handbook of Sensor Networking: Advanced Technologies and Applications provides a complete professional reference and practitioner's guide to today's advanced sensor networking technologies. The handbook focuses on both established and recent sensor networking theory, technology, and practice. Specialists at the forefront of the field address immediate and long-term challenges in their respective areas of expertise and explore practical solutions to a wide range of sensor networking issues. This comprehensive handbook is suitable for a range of readers, including researchers and practitioners, upper-division undergraduate and graduate students, sensor networking technologists and engineers, and security, law enforcement, and governmental agencies. The book gives readers a thorough understanding of the hardware of sensor networks, wireless communication protocols, sensor networks software and architectures, wireless information networks, data manipulation, signal processing, localization, and object tracking through sensor networks.

Security in the Private Cloud (Paperback): John R Vacca Security in the Private Cloud (Paperback)
John R Vacca
R1,379 Discovery Miles 13 790 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Public Key Infrastructure - Building Trusted Applications and Web Services (Paperback): John R Vacca Public Key Infrastructure - Building Trusted Applications and Web Services (Paperback)
John R Vacca
R1,698 Discovery Miles 16 980 Ships in 12 - 17 working days

With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Information Technology landscape. Although these technologies have been around for over twenty years, this legislative move will surely boost e-commerce activity. Secure electronic business transactions, such as contracts, legal documents, insurance, and bank loans are now legally recognized. In order to adjust to the realities of the marketplace, other services may be needed, such as a non-repudiation service, digital notary, or digital time-stamping service. The collection of these components, known as Public Key Infrastructure (PKI), is paving the way for secure communications within organizations and on the public Internet.

Cloud Computing Security - Foundations and Challenges (Hardcover, 2nd edition): John R Vacca Cloud Computing Security - Foundations and Challenges (Hardcover, 2nd edition)
John R Vacca
R3,791 R3,511 Discovery Miles 35 110 Save R280 (7%) Ships in 12 - 17 working days

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features * Covers patching and configuration vulnerabilities of a cloud server * Evaluates methods for data encryption and long-term storage in a cloud server * Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

Online Terrorist Propaganda, Recruitment, and Radicalization (Hardcover): John R Vacca Online Terrorist Propaganda, Recruitment, and Radicalization (Hardcover)
John R Vacca
R3,372 Discovery Miles 33 720 Ships in 12 - 17 working days

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field-including practitioners and terrorism researchers-the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,460 Discovery Miles 44 600 Ships in 10 - 15 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Practical Internet Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): John R Vacca Practical Internet Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
John R Vacca
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Cloud Computing Security - Foundations and Challenges (Paperback, 2nd edition): John R Vacca Cloud Computing Security - Foundations and Challenges (Paperback, 2nd edition)
John R Vacca
R1,841 Discovery Miles 18 410 Ships in 12 - 17 working days

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. Features * Covers patching and configuration vulnerabilities of a cloud server * Evaluates methods for data encryption and long-term storage in a cloud server * Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

Nanoscale Networking and Communications Handbook (Hardcover): John R Vacca Nanoscale Networking and Communications Handbook (Hardcover)
John R Vacca
R4,207 Discovery Miles 42 070 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference as well as a practitioner's guide to today's most complete and concise view of nanoscale networking and communications. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies and recent advancements. It explores practical solutions to a wide range of nanoscale networking and communications issues. Individual chapters, authored by leading experts in the field, address the immediate and long-term challenges in the authors' respective areas of expertise. Key Features Identifies the main differences between nanonetworks and classical wireless networks and explains how to leverage those to develop new communication techniques for nanonetworks Presents the different alternatives for network communication among nanomachines, whether these are nanomaterial-based devices or genetically modified cells Provides a framework that will stimulate vision for a family of technologies in nanonetworking communications and multi-scale integration

Electronic Commerce (Paperback, 4th Revised edition): Peter Loshin, John R Vacca, Paul Murphy Electronic Commerce (Paperback, 4th Revised edition)
Peter Loshin, John R Vacca, Paul Murphy
Sold By Aristata Bookshop - Fulfilled by Loot
R247 Discovery Miles 2 470 Ships in 2 - 4 working days

This new edition of the best-selling book/CD package gives a complete overview of the electronic commerce environment. It has been revised and completely updated to reflect the most recent trends in security, EDI, B2B, dotcoms, and online trading. Covering everything from fundamental encryption issues to future trends, this comprehensive guide provides a thorough study of electronic commerce and the tools needed to conduct business on the Internet.

Smart Cities Policies and Financing - Approaches and Solutions (Paperback): John R Vacca Smart Cities Policies and Financing - Approaches and Solutions (Paperback)
John R Vacca
R2,999 Discovery Miles 29 990 Ships in 12 - 17 working days

Smart Cities Policies and Financing: Approaches and Solutions is the definitive professional reference for harnessing the full potential of policy making and financial planning in smart cities. It covers the effective tools for capturing the dynamic relations between people, policies, financing, and environments, and where they are most often useful and effective for all relevant stakeholders. The book examines the key role of science, technology, and innovation (STI) - especially in information and communications technologies - in the design, development, and management of smart cities policies and financing. It identifies the problems and offers practical solutions in implementation of smart infrastructure policies and financing. Smart Cities Policies and Financing is also about how the implementation of smart infrastructure projects (related to the challenges of the lack of financing and the application of suitable policies) underlines the key roles of science, technology and innovation (STI) communities in addressing these challenges and provides key policies and financing that will help guide the design and development of smart cities.

Wireless Data Demystified (Paperback, Ed): John R Vacca Wireless Data Demystified (Paperback, Ed)
John R Vacca
R1,512 R1,214 Discovery Miles 12 140 Save R298 (20%) Ships in 10 - 15 working days

UNDERSTAND WIRELESS DATA COMPLETELY, EASILY WITH WIRELESS DATA DEMYSTIFIED


Wireless subscribers are up, but revenue per subscriber isn’t – and it isn’t going to be unless wireless service providers can provide more than plain-vanilla voice services. The road to successful deployment of data services has been difficult, but it is essential if the industry is going to survive. This book takes you inside the data services that will – one way or another – transform the wireless industry.


John R. Vacca wrote the book on wireless data, literally: His Wireless Broadband Networks Handbook is the field’s standard professional reference. Now, in Wireless Data Demystified, he offers a book anyone can understand—without being a certified technical expert. And if you are a technical expert, you will find here the essentials you need, without wading through hundreds of pages of technical detail.


You must read this book if—

* understanding wireless data technologies and their future is your career

* you want a sightline on interlinked wireless data technologies – and a realistic timeline on what’s really happening now

* wireless e-mail, e-commerce, audio, video, stock quotes, information retrieval, and other subscriber services are part of your plan for the future

* networks, technologies, and the protocols that deliver wireless data services are your responsibility

* making the move from straight wireless voice services to data is your company’s survival strategy – or should be

* basic network design and deployment concepts, clearly explained, could put you ahead of the pack

* implementing fixed wireless or WLL (wireless local loop) is a service possibility

* you’re a network manager, administrator, or technician, or work in wireless sales or marketing

* you can see past the troubled present to future investment potential of wireless data


Transmitting wireless data will be a $7.5 billion-a-year business by 2005, industry analysts predict. This book unpacks wireless data essentials to position you to take advantage of this difficult but fast-growing market.

Firewalls - Jumpstart for Network and Systems Administrators (Paperback): John R Vacca, Scott Ellis Firewalls - Jumpstart for Network and Systems Administrators (Paperback)
John R Vacca, Scott Ellis
R2,508 Discovery Miles 25 080 Ships in 10 - 15 working days

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.
-Install and configure proxy-based and stateful-filtering firewalls
-Protect internal IP addresses with NAT and deploy a secure DNS architecture
-Develop an Internet/intranet security policy to protect your organization's systems and data
-Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures

I-mode Crash Course (Paperback): John R Vacca I-mode Crash Course (Paperback)
John R Vacca
R1,070 R884 Discovery Miles 8 840 Save R186 (17%) Ships in 10 - 15 working days

Insider details on the world’s most successful wireless Internet application


The wireless Internet service that dominates the Japanese market is coming to the United States and Europe. i-mode Crash Course helps you prepare, whether your interest is technical or financial…whether you’re offering the killer app or competing against it…even if you’re simply a consumer who wants to get on top of the latest technology. Author John Vacca’s big-picture focus includes installation, deployment and configuration. He provides the insights you need to analyze markets, predict results, and influence outcomes. Learn:


  • How i-mode connects cell phones and other handhelds to the Internet for instant messaging, email, online shopping, real-time news, stocks, weather reports, and more
  • Why i-mode beat out WAP
  • Development secrets behind i-mode applications and the advantages of cHTML
  • The Japanese market strategy and plans to take America and Europe this year

Security in the Private Cloud (Hardcover): John R Vacca Security in the Private Cloud (Hardcover)
John R Vacca
R3,771 Discovery Miles 37 710 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Bestway Solar Float Lamp
R265 Discovery Miles 2 650
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Bostik Clear on Blister Card (25ml)
R38 Discovery Miles 380
Ripley's Believe It Or Not! 2024
Ripley Hardcover R585 R457 Discovery Miles 4 570
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Not available
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Multi-Functional Bamboo Standing Laptop…
R1,399 R669 Discovery Miles 6 690
Create Your Own Candles
Hinkler Pty Ltd Kit R199 R95 Discovery Miles 950

 

Partners