0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Security in Computing (Paperback, 6th edition): Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp Security in Computing (Paperback, 6th edition)
Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp
R2,945 R2,466 Discovery Miles 24 660 Save R479 (16%) Ships in 12 - 17 working days

The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types The security practitioner's toolbox: Identification and authentication, access control, and cryptography Areas of practice: Securing programs, user–internet interaction, operating systems, networks, data, databases, and cloud computing Cross-cutting disciplines: Privacy, management, law, and ethics Using cryptography: Formal and mathematical underpinnings, and applications of cryptography Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings... Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings (Paperback, 2013 ed.)
Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp
R1,429 Discovery Miles 14 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.

Inclusive Security - Digital Security Meets Web Science (Paperback): Lizzie Coles-Kemp Inclusive Security - Digital Security Meets Web Science (Paperback)
Lizzie Coles-Kemp; Illustrated by Alice Angus
R2,354 Discovery Miles 23 540 Ships in 10 - 15 working days

As we become increasingly dependent on digital products in all aspects of our lives, the reliability of that technology increases in importance. Technological security can be thought of as the control of access to technical systems and the control of the use of those systems. However, the way that digital technologies are woven across the fabric of our everyday lives, and are embedded in all our institutions, means that we need a paradigm for understanding technological security as being part of other forms of security. This monograph introduces the paradigm of digital security that not only encompasses the protection of digital technologies and the data it produces but also the practices and processes that link those technologies. It encompasses the political and social processes and practices that shape the meanings and experiences of the digital protection mechanisms. In a digitally mediated society, security of the state, of society, of individuals, and of technologies are bound together through these processes and practices, giving new security meanings to security technologies and policies. Grounded in the interdisciplinary endeavours that characterise Web Science, this monograph presents the case for this more inclusive form of technological security. Such a security places the security of technology in the context of the security of people operating in a web-enabled and digitally-connected society and results in a digital security that responds to the enmeshed nature of technology and society. This monograph situates digital security within the broader landscape of social and political theories of security, and uses a critical security lens to encourage the reader to explore how digitally networked technologies are both included in and influenced by the co-creation of artefacts and practices in open environments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Coty Vanilla Musk Cologne Spray (50ml…
R852 R508 Discovery Miles 5 080
Great Johannesburg - What Happened? How…
Nickolaus Bauer Paperback R330 R240 Discovery Miles 2 400
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Poor Things
Emma Stone, Mark Ruffalo, … DVD R449 R329 Discovery Miles 3 290
Bestway Spider-Man Beach Ball (51cm)
R50 R45 Discovery Miles 450
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Bantex B2241 A4 Embossed Secretarial…
R18 Discovery Miles 180

 

Partners