0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (10)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 11 of 11 matches in All Departments

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,218 Discovery Miles 12 180 Ships in 12 - 17 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Extremist Propaganda in Social Media - A Threat to Homeland Security (Paperback): Michael Erbschloe Extremist Propaganda in Social Media - A Threat to Homeland Security (Paperback)
Michael Erbschloe
R1,712 Discovery Miles 17 120 Ships in 12 - 17 working days

Extremist Propaganda in Social Media: A Threat to Homeland Security presents both an analysis of the impact of propaganda in social media and the rise of extremism in mass society from technological and social perspectives. The book identifies the current phenomenon, what shall be dubbed for purposes of this book "Blisstopian Societies"-characterized in the abiding "ignorance is bliss" principle-whereby a population is complacent and has unquestioning acceptance of a social doctrine without challenge and introspection. In these subcultures, the malleable population self-select social media content, "news," and propaganda delivery mechanisms. By doing so, they expose themselves only to content that motivates, reinforces, and contributes to their isolation, alienation, and self-regulation of the social groups and individuals. In doing this, objective news is dismissed, fake-or news otherwise intended to misinform-reinforces their stereotyped beliefs about society and the world around them. This phenomenon is, unfortunately, not "fake news," but a real threat to which counterterror, intelligence, Homeland Security, law enforcement, the military, and global organizations must be hyper-vigilant of, now and into the foreseeable future. Chapters cite numerous examples from the 2016 political election, the Russia investigation into the Trump Campaign, ISIS, domestic US terrorists, among many other examples of extremist and radicalizing rhetoric. The book illustrates throughout that this contrived and manufactured bliss has fueled the rise and perpetuation of hate crimes, radicalism, and violence in such groups as ISIS, Boko Haram, Neo-Nazis, white separatists, and white supremacists in the United States-in addition to perpetuating ethnic cleansing actions around the world. This dynamic has led to increased political polarization in the United States and abroad, while furthering an unwillingness and inability to both compromise or see others' perspectives-further fomenting insular populations increasing willing to harm others and do violence. Extremist Propaganda in Social Media relates current Blisstopian practices to real-world hate speech and violence, connecting how such information is consumed by groups and translated into violent action. The book is an invaluable resources for those professionals that require an awareness of social media radicalization including: social media strategists, law enforcement, Homeland Security professionals, military planners and operatives-anyone tasked with countering combat such violent factions and fringes in conflict situations.

Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback): Michael Erbschloe Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback)
Michael Erbschloe
R1,398 Discovery Miles 13 980 Ships in 12 - 17 working days

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.

Social Media Warfare - Equal Weapons for All (Paperback): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Paperback)
Michael Erbschloe
R1,372 Discovery Miles 13 720 Ships in 12 - 17 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Social Engineering - Hacking Systems, Nations, and Societies (Paperback): Michael Erbschloe Social Engineering - Hacking Systems, Nations, and Societies (Paperback)
Michael Erbschloe
R1,259 Discovery Miles 12 590 Ships in 12 - 17 working days

This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, you'll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security.

Extremist Propaganda in Social Media - A Threat to Homeland Security (Hardcover): Michael Erbschloe Extremist Propaganda in Social Media - A Threat to Homeland Security (Hardcover)
Michael Erbschloe
R4,070 Discovery Miles 40 700 Ships in 12 - 17 working days

Extremist Propaganda in Social Media: A Threat to Homeland Security presents both an analysis of the impact of propaganda in social media and the rise of extremism in mass society from technological and social perspectives. The book identifies the current phenomenon, what shall be dubbed for purposes of this book "Blisstopian Societies"-characterized in the abiding "ignorance is bliss" principle-whereby a population is complacent and has unquestioning acceptance of a social doctrine without challenge and introspection. In these subcultures, the malleable population self-select social media content, "news," and propaganda delivery mechanisms. By doing so, they expose themselves only to content that motivates, reinforces, and contributes to their isolation, alienation, and self-regulation of the social groups and individuals. In doing this, objective news is dismissed, fake-or news otherwise intended to misinform-reinforces their stereotyped beliefs about society and the world around them. This phenomenon is, unfortunately, not "fake news," but a real threat to which counterterror, intelligence, Homeland Security, law enforcement, the military, and global organizations must be hyper-vigilant of, now and into the foreseeable future. Chapters cite numerous examples from the 2016 political election, the Russia investigation into the Trump Campaign, ISIS, domestic US terrorists, among many other examples of extremist and radicalizing rhetoric. The book illustrates throughout that this contrived and manufactured bliss has fueled the rise and perpetuation of hate crimes, radicalism, and violence in such groups as ISIS, Boko Haram, Neo-Nazis, white separatists, and white supremacists in the United States-in addition to perpetuating ethnic cleansing actions around the world. This dynamic has led to increased political polarization in the United States and abroad, while furthering an unwillingness and inability to both compromise or see others' perspectives-further fomenting insular populations increasing willing to harm others and do violence. Extremist Propaganda in Social Media relates current Blisstopian practices to real-world hate speech and violence, connecting how such information is consumed by groups and translated into violent action. The book is an invaluable resources for those professionals that require an awareness of social media radicalization including: social media strategists, law enforcement, Homeland Security professionals, military planners and operatives-anyone tasked with countering combat such violent factions and fringes in conflict situations.

Physical Security for IT (Paperback): Michael Erbschloe Physical Security for IT (Paperback)
Michael Erbschloe
R2,294 Discovery Miles 22 940 Ships in 10 - 15 working days

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications.
Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.
* Expert advice on identifying physical security needs
* Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems
* Explanation of the processes for establishing a physical IT security function
* Step-by-step instructions on how to accomplish physical security objectives
* Illustrations of the major elements of a physical IT security plan
* Specific guidance on how to develop and document physical security methods and procedures

Implementing Homeland Security for Enterprise IT (Paperback, New): Michael Erbschloe Implementing Homeland Security for Enterprise IT (Paperback, New)
Michael Erbschloe
R2,268 Discovery Miles 22 680 Ships in 10 - 15 working days

This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001.
The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice.
*A one-minute manager approach to issuesp provides background and explanations in all areas
*Step-by-step instructions on how to accomplish objectives guide readers through processes
*Easy to implement advice allows readers to take quick action

Socially Responsible IT Management (Paperback): Michael Erbschloe Socially Responsible IT Management (Paperback)
Michael Erbschloe
R2,286 Discovery Miles 22 860 Ships in 10 - 15 working days

Socially Responsible IT Management shows IT professionals how to overcome the social crisis that has resulted from the wide-spread use of information technology. By responsibly managing security threats, protecting individual privacy, reducing hazardous waste, and minimizing other negative effects on IT staff and computer users, as well as ordinary citizens around the world, IT professionals can benefit the society at large and reap rewards for their own organizations as well.
Scandals at Enron, Andersen, Sotheby's and Christie's, Merrill Lynch, and Tyco are fueling a crisis of confidence in business. Regulators, voters, investors, customers, and employees are demanding that businesses be more socially responsible. Rhetoric is not enough, all organizations need to demonstrate that they are living up to social expectations. Erbschloe shows managers how to take charge of key aspects of their IT operations and follow a morally, ethically, and legally correct path to success.
. Supported by author speaking tour and "Computer Economics" website, www.computereconomics.com
. Step-by-step instructions on how to accomplish objectives of privacy and security
. Explains principles of ergonomics, energy efficiency, and recycling that can bring return on investment"

Social Media Warfare - Equal Weapons for All (Hardcover): Michael Erbschloe Social Media Warfare - Equal Weapons for All (Hardcover)
Michael Erbschloe
R1,902 Discovery Miles 19 020 Ships in 12 - 17 working days

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Walling Out the Insiders - Controlling Access to Improve Organizational Security (Paperback): Michael Erbschloe Walling Out the Insiders - Controlling Access to Improve Organizational Security (Paperback)
Michael Erbschloe
R2,162 Discovery Miles 21 620 Ships in 12 - 17 working days

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Britney Spears Fantasy Eau De Parfum…
R496 R410 Discovery Miles 4 100
Marco Cellphone Ring & Stand [Black]
R59 R29 Discovery Miles 290
The Year Of Facing Fire - A Memoir
Helena Kriel Paperback R315 R271 Discovery Miles 2 710
Bostik Art & Craft White Glue (100ml)
R51 Discovery Miles 510
- (Subtract)
Ed Sheeran CD R165 R68 Discovery Miles 680
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn Paperback R280 R199 Discovery Miles 1 990
CoolKids Digital Mid-size 30M WR Watch…
R176 Discovery Miles 1 760
Cooking Lekka - Comforting Recipes For…
Thameenah Daniels Paperback R290 Discovery Miles 2 900
Ab Wheel
R209 R149 Discovery Miles 1 490
Home Classix Placemats - Geometric…
R59 R51 Discovery Miles 510

 

Partners