0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Cyber Conflicts and Small States (Hardcover, New edition): Lech J. Janczewski, William Caelli Cyber Conflicts and Small States (Hardcover, New edition)
Lech J. Janczewski, William Caelli
R4,591 Discovery Miles 45 910 Ships in 12 - 17 working days

The probability of a world-wide cyber conflict is small. Yet the probability of forms of cyber conflict, regional or even global, could be argued as being very high. Small countries are usually signatories to military and economic alliances with major world powers but rely heavily on the technical ability of these powers in protecting their own national interests. They may be considered to be IT 'technology colonies'. Their cyber infrastructure is usually fully imported and their ability to assess it is limited. This book poses the question: to what extent should, or can, a small country prepare itself for handling the broad range of cyber threats? Looking at cyber-warfare, cyber-terrorism, cyber-crime and associated concerns, national experts from New Zealand, Australia, The Netherlands, and Poland present analyses of cyber-defence realities, priorities and options for smaller countries. They show that what is needed is the ability of small nations to be able to define and prepare appropriate responses such as the role of military/law enforcement/business entities, continuity and resilience strategies, incident response and business continuity plans and more for handing nationally-aimed cyber-attacks particularly where these address national critical infrastructures.

Cyber Conflicts and Small States (Paperback): Lech J. Janczewski, William Caelli Cyber Conflicts and Small States (Paperback)
Lech J. Janczewski, William Caelli
R1,289 Discovery Miles 12 890 Ships in 12 - 17 working days

The probability of a world-wide cyber conflict is small. Yet the probability of forms of cyber conflict, regional or even global, could be argued as being very high. Small countries are usually signatories to military and economic alliances with major world powers but rely heavily on the technical ability of these powers in protecting their own national interests. They may be considered to be IT 'technology colonies'. Their cyber infrastructure is usually fully imported and their ability to assess it is limited. This book poses the question: to what extent should, or can, a small country prepare itself for handling the broad range of cyber threats? Looking at cyber-warfare, cyber-terrorism, cyber-crime and associated concerns, national experts from New Zealand, Australia, The Netherlands, and Poland present analyses of cyber-defence realities, priorities and options for smaller countries. They show that what is needed is the ability of small nations to be able to define and prepare appropriate responses such as the role of military/law enforcement/business entities, continuity and resilience strategies, incident response and business continuity plans and more for handing nationally-aimed cyber-attacks particularly where these address national critical infrastructures.

Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992): Dennis Longley, Michael Shain,... Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992)
Dennis Longley, Michael Shain, William Caelli
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The dictionary contains extended essays on risk analysis, personal computing, key management, pin management and authentication.

Information Security for Managers (Paperback, 1st ed. 1989): William Caelli, Denis Longley Information Security for Managers (Paperback, 1st ed. 1989)
William Caelli, Denis Longley
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days

The purpose of this book is to answer the questions that all responsible managers are asking or will ask on the subject of information security. There are few managers with first hand experience of serious attacks or catastrophic occurrences with regard to integrated information systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Complete Snack-A-Chew Iced Dog Biscuits…
R114 Discovery Miles 1 140
Playstation 4 Replacement Case
 (9)
R56 Discovery Miles 560
Shield Car Polish Paste (300ml)
R59 Discovery Miles 590
Ab Wheel
R209 R149 Discovery Miles 1 490
Gotcha Digital-Midsize 30 M-WR Ladies…
R250 R198 Discovery Miles 1 980
ZA Cute Butterfly Earrings and Necklace…
R712 R499 Discovery Miles 4 990
Strontium Technology AMMO USB 3.1 flash…
R70 Discovery Miles 700
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Corsair AF120L PC Case Fan (1300 RPM)
R199 R173 Discovery Miles 1 730

 

Partners