0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Security in Computing (Paperback, 6th edition): Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp Security in Computing (Paperback, 6th edition)
Charles Pfleeger, Shari Pfleeger, Lizzie Coles-Kemp
R2,413 Discovery Miles 24 130 Ships in 10 - 15 working days

The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types The security practitioner's toolbox: Identification and authentication, access control, and cryptography Areas of practice: Securing programs, user–internet interaction, operating systems, networks, data, databases, and cloud computing Cross-cutting disciplines: Privacy, management, law, and ethics Using cryptography: Formal and mathematical underpinnings, and applications of cryptography Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach (Hardcover, United States ed of 1st ed):... Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach (Hardcover, United States ed of 1st ed)
Charles Pfleeger, Shari Pfleeger
Sold By Aristata Bookshop - Fulfilled by Loot
R3,324 Discovery Miles 33 240 Ships in 4 - 6 working days

""In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today's cybersecurity challenges. Their use of the threat-vulnerability-countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.""--Charles C. Palmer, IBM Research The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures "Analyzing Computer Security "is a fresh, modern, and relevant introduction to computer security. Organized around today's key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security--so you can prevent serious problems and mitigate the effects of those that still occur. In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger--authors of the classic "Security in Computing"--teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations. The book covers "hot button" issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure. Coverage includes

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it's useless "security theater"
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media
Security in Computing (Hardcover, 5th edition): Charles Pfleeger, Shari Pfleeger, Jonathan Margulies Security in Computing (Hardcover, 5th edition)
Charles Pfleeger, Shari Pfleeger, Jonathan Margulies
Sold By Aristata Bookshop - Fulfilled by Loot
R3,440 Discovery Miles 34 400 Ships in 4 - 6 working days

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today's newest technologies, attacks, standards, and trends. Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward. You'll start by mastering the field's basic terms, principles, and concepts. Next, you'll apply these basics in diverse situations and environments, learning to "think like an attacker" and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you'll go beyond technology to understand crucial management issues in protecting infrastructure and data. New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user-web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare-recent attacks and emerging risks Security flaws and risks associated with electronic voting systems

Software Engineering - Theory and Practice (Hardcover, 4th edition): Shari Pfleeger, Joanne Atlee Software Engineering - Theory and Practice (Hardcover, 4th edition)
Shari Pfleeger, Joanne Atlee
R6,380 Discovery Miles 63 800 Ships in 18 - 22 working days

KEY BENEFIT This introduction to software engineering and practice addresses both procedural and object-oriented development. KEY TOPICS Is thoroughly updated to reflect significant changes in software engineering, including modeling and agile methods. Emphasizes essential role of modeling design in software engineering. Applies concepts consistently to two common examples -- a typical information system and a real-time system. Combines theory with real, practical applications by providing an abundance of case studies and examples from the current literature. MARKET A useful reference for software engineers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mediabox NEO TV Stick (Black) - Netflix…
R1,199 R1,073 Discovery Miles 10 730
DR. Aquafine Travel Set (24 Colours…
 (2)
R786 R693 Discovery Miles 6 930
Sony NEW Playstation Dualshock 4 v2…
 (3)
R1,696 Discovery Miles 16 960
Russell Hobbs Pearl Glide Iron (2600W…
R799 R738 Discovery Miles 7 380
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
ZA Cute Puppy Love Paw Set (Necklace…
R712 R499 Discovery Miles 4 990
100 Mandela Moments
Kate Sidley Paperback R260 R232 Discovery Miles 2 320
Silent Witness - Season 28
Emilia Fox, David Caves DVD R401 Discovery Miles 4 010
PVC 6-Can Cooler
R47 Discovery Miles 470
Sony PlayStation 5 DualSense Wireless…
R1,654 Discovery Miles 16 540

 

Partners