0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Wireless Security: Know It All (Paperback): Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A.... Wireless Security: Know It All (Paperback)
Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A. Rackley, …
R1,599 Discovery Miles 15 990 Ships in 12 - 17 working days

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf
Communications engineers need to master a wide area of topics to excel. The "Wireless Security Know It All" covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume"

Business Continuity and Disaster Recovery for InfoSec Managers (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD,... Business Continuity and Disaster Recovery for InfoSec Managers (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,503 Discovery Miles 25 030 Ships in 10 - 15 working days

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
.Provides critical strategies for maintaining basic business functions when and if systems are shut down
.Establishes up to date methods and techniques for maintaining second site back up and recovery
.Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters"

IM Instant Messaging Security (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP IM Instant Messaging Security (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,672 Discovery Miles 26 720 Ships in 10 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Voice over Internet Protocol (VoIP) Security (Paperback, New): James F. Ransome, PhD, CISM, CISSP, John Rittinghouse Phd Cism Voice over Internet Protocol (VoIP) Security (Paperback, New)
James F. Ransome, PhD, CISM, CISSP, John Rittinghouse Phd Cism
R2,290 Discovery Miles 22 900 Ships in 10 - 15 working days

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today s complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.
* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation.
* In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.

Wireless Operational Security (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP Wireless Operational Security (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,967 Discovery Miles 29 670 Ships in 10 - 15 working days

This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap.
*Presents a new "WISDOM" model for Wireless Security Infrastructures
*Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations
*Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC

Managing Software Deliverables - A Software Development Management Methodology (Paperback, New): John Rittinghouse Phd Cism Managing Software Deliverables - A Software Development Management Methodology (Paperback, New)
John Rittinghouse Phd Cism
R2,475 Discovery Miles 24 750 Ships in 10 - 15 working days

Managing Software Development describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need for these processes. In some instances, an organization may already have a PMO chartered with overall responsibility for each project managed in an enterprise. In those cases, this book will either provide validation of their efforts or it will provide some techniques and useful approaches that can be utilized to further improve on their overall implementation of the PMO. In the vast majority of cases in business, however, a PMO is unheard of. Each project managed in the enterprise is unfortunately managed separately from all others (at great cost in both time and money to the enterprise). The book provides a downloadable "drop-in" web site containing every type of template needed to perform the activities described here.
*Phase Roadmaps clearly depict what is expected by all parties at each phase of effort
*Pre-built Intranet is ready to deploy in a corporate setting and provides immediate use
*Process Methodology adheres to proven best-practices for software development

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Westworld - Season 4 - The Choice
Evan Rachel Wood, Thandiwe Newton, … DVD R371 Discovery Miles 3 710
Dala A2 Sketch Pad (120gsm)(36 Sheets)
R260 Discovery Miles 2 600
GM Bowling Machine Ball (Red)
R110 R96 Discovery Miles 960
Fly Repellent ShooAway (Black)(2 Pack)
R698 R578 Discovery Miles 5 780
Elecstor 18W In-Line UPS (Black)
R999 R404 Discovery Miles 4 040
Vital BabyŽ HYGIENE™ Super Soft Hand…
R45 Discovery Miles 450
Bostik Glue Stick - Loose (25g)
R42 R22 Discovery Miles 220
Russell Hobbs Toaster (2 Slice…
R707 Discovery Miles 7 070
Catrice Full Satin Nude Lipstick 050
 (1)
R101 R89 Discovery Miles 890
Baby Dove Soap Bar Rich Moisture 75g
R20 Discovery Miles 200

 

Partners