0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Cyber Conflicts and Small States (Hardcover, New edition): Lech J. Janczewski, William Caelli Cyber Conflicts and Small States (Hardcover, New edition)
Lech J. Janczewski, William Caelli
R4,414 Discovery Miles 44 140 Ships in 12 - 17 working days

The probability of a world-wide cyber conflict is small. Yet the probability of forms of cyber conflict, regional or even global, could be argued as being very high. Small countries are usually signatories to military and economic alliances with major world powers but rely heavily on the technical ability of these powers in protecting their own national interests. They may be considered to be IT 'technology colonies'. Their cyber infrastructure is usually fully imported and their ability to assess it is limited. This book poses the question: to what extent should, or can, a small country prepare itself for handling the broad range of cyber threats? Looking at cyber-warfare, cyber-terrorism, cyber-crime and associated concerns, national experts from New Zealand, Australia, The Netherlands, and Poland present analyses of cyber-defence realities, priorities and options for smaller countries. They show that what is needed is the ability of small nations to be able to define and prepare appropriate responses such as the role of military/law enforcement/business entities, continuity and resilience strategies, incident response and business continuity plans and more for handing nationally-aimed cyber-attacks particularly where these address national critical infrastructures.

Cyber Conflicts and Small States (Paperback): Lech J. Janczewski, William Caelli Cyber Conflicts and Small States (Paperback)
Lech J. Janczewski, William Caelli
R1,241 Discovery Miles 12 410 Ships in 12 - 17 working days

The probability of a world-wide cyber conflict is small. Yet the probability of forms of cyber conflict, regional or even global, could be argued as being very high. Small countries are usually signatories to military and economic alliances with major world powers but rely heavily on the technical ability of these powers in protecting their own national interests. They may be considered to be IT 'technology colonies'. Their cyber infrastructure is usually fully imported and their ability to assess it is limited. This book poses the question: to what extent should, or can, a small country prepare itself for handling the broad range of cyber threats? Looking at cyber-warfare, cyber-terrorism, cyber-crime and associated concerns, national experts from New Zealand, Australia, The Netherlands, and Poland present analyses of cyber-defence realities, priorities and options for smaller countries. They show that what is needed is the ability of small nations to be able to define and prepare appropriate responses such as the role of military/law enforcement/business entities, continuity and resilience strategies, incident response and business continuity plans and more for handing nationally-aimed cyber-attacks particularly where these address national critical infrastructures.

Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992): Dennis Longley, Michael Shain,... Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992)
Dennis Longley, Michael Shain, William Caelli
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The dictionary contains extended essays on risk analysis, personal computing, key management, pin management and authentication.

Information Security for Managers (Paperback, 1st ed. 1989): William Caelli, Denis Longley Information Security for Managers (Paperback, 1st ed. 1989)
William Caelli, Denis Longley
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

The purpose of this book is to answer the questions that all responsible managers are asking or will ask on the subject of information security. There are few managers with first hand experience of serious attacks or catastrophic occurrences with regard to integrated information systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
The Personal History Of David…
Dev Patel, Peter Capaldi, … DVD  (1)
R63 Discovery Miles 630
Crybaby
Tegan & Sara CD R363 Discovery Miles 3 630
Multi Colour Jungle Stripe Neckerchief
R119 Discovery Miles 1 190
ZA Choker Necklace
R570 R399 Discovery Miles 3 990
Rotatrim A4 Paper Ream (80gsm)(500…
R97 Discovery Miles 970
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Razer DeathAdder Essential mouse…
R889 Discovery Miles 8 890

 

Partners