0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,644)
  • R250 - R500 (714)
  • R500+ (5,140)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Security in Fixed and Wireless Networks (Hardcover, 2nd Edition): Guenter Schaefer, Michael Rossberg Security in Fixed and Wireless Networks (Hardcover, 2nd Edition)
Guenter Schaefer, Michael Rossberg
R2,267 R1,796 Discovery Miles 17 960 Save R471 (21%) Ships in 7 - 11 working days

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.

Hacking Exposed Web Applications, Third Edition (Paperback, 3rd edition): Joel Scambray, Vincent Liu, Caleb Sima Hacking Exposed Web Applications, Third Edition (Paperback, 3rd edition)
Joel Scambray, Vincent Liu, Caleb Sima
R1,070 R824 Discovery Miles 8 240 Save R246 (23%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest Web app attacks and countermeasures from world-renowned practitionersProtect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource. Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authentication technologies See how real-world session attacks leak sensitive data and how to fortify your applications Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments Safety deploy XML, social networking, cloud computing, and Web 2.0 services Defend against RIA, Ajax, UGC, and browser-based, client-side exploits Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures

Laboratory Manual to Accompany Security Strategies in Web Applications and Social Networking (Paperback): vLab Solutions Laboratory Manual to Accompany Security Strategies in Web Applications and Social Networking (Paperback)
vLab Solutions
R316 Discovery Miles 3 160 Ships in 10 - 15 working days

The Laboratory Manual to Accompany Security Strategies in Web Applications and Social Networking is the lab companion to the Information Systems and Security Series title, Security Strategies in Web Applications and Social Networking. It provides hands-on exercises using the Jones & Bartlett Learning Virtual Security Cloud Labs, that provide real-world experience with measurable learning outcomes. About the Series: Visit www.issaseries.com for a complete look at the series! The Jones & Bartlett Learning Information System & Assurance Series delivers fundamental IT security principles packed with real-world applications and examples for IT Security, Cybersecurity, Information Assurance, and Information Systems Security programs. Authored by Certified Information Systems Security Professionals (CISSPs), and reviewed by leading technical experts in the field, these books are current forward-thinking resources that enable readers to solve the cybersecurity challenges of today and tomorrow.

Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016): Ehab Al-Shaer,... Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016)
Ehab Al-Shaer, Mohammad Ashiqur Rahman
R2,718 R2,461 Discovery Miles 24 610 Save R257 (9%) Ships in 10 - 15 working days

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.

The Trump Internet Password Logbook (Paperback): M G Anthony The Trump Internet Password Logbook (Paperback)
M G Anthony
R198 R184 Discovery Miles 1 840 Save R14 (7%) Ships in 7 - 11 working days

Safeguard your internet security by just saying Nyet! to piles of sticky notes. Do you always forget your passwords because your memory has gone to pot? Do you squirrel away scraps of cryptic notes with passwords and logins that only you understand-but then later you don't have a clue what they're for? Are you worried about hackers? The Russians? North Korea? Or even our own government? We hear you. This simple, organized way to keep track of web addresses, usernames, logins, and passwords will solve all your problems. (Okay, not all.) But here's what it can do: Alphabetical sections for an easy web address search Handy size to discreetly tuck away at home Extra pages to track additional information such as software notes or equipment network settings. Notes pages for-whatever! The Trump Internet Password Logbook is ready to bug out when you do-because you just don't know who you can trust.

Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in... Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in Hungary (Hardcover, 1st ed. 2016)
Laszlo Nadai, Jozsef Padanyi
R2,997 R2,710 Discovery Miles 27 100 Save R287 (10%) Ships in 10 - 15 working days

This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service.

Guide to Optimal Operational Risk and BASEL II (Hardcover): Ioannis S. Akkizidis, Vivianne Bouchereau Guide to Optimal Operational Risk and BASEL II (Hardcover)
Ioannis S. Akkizidis, Vivianne Bouchereau
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements. This volume provides detailed guidance for the design and implementation of an efficient operational risk management system. It contains all elements of assessment, including operational risk identification, measurement, modeling, and monitoring analysis, along with evaluation analysis and the estimation of capital requirements. The authors also address the managing and controlling of operational risks including operational risk profiling, risk optimization, cost & optimal resource allocation, decision-making, and design of optimal risk policies. Divided into four parts, this book begins by introducing the idea of operational risks and how they affect financial organizations. This section also focuses on the main aspects of managing operational risks. The second part focuses on the requirements of an operational risk management framework according to the Basel II Accord. The third part focuses on all stages of operational risk assessment, and the fourth part focuses on the control and management stages. All of these stages combine to implement efficient and optimal operational risk management systems.

CRACK99 - The Takedown of a $100 Million Chinese Software Pirate (Hardcover): David Locke Hall CRACK99 - The Takedown of a $100 Million Chinese Software Pirate (Hardcover)
David Locke Hall
R511 Discovery Miles 5 110 Ships in 10 - 15 working days

Digital pirates, particularly in China, steal and resell hundreds of billions of dollars worth of intellectual property each year. CRACK99 is an edge-of-the-seat account of the United States Justice Department's prosecution of the biggest cybercriminal operation to date. On a cheesy website called CRACK99, Xiang Li sold everything from satellite tracking and aviation simulation to communications systems design software for knock-down prices. When David Locke Hall and his team started buying CRACK99's products, the hunt for this elusive pirate began. After earning Xiang's trust, Hall's team met Xiang on Saipan, where the sting was nearly foiled before Xiang was captured, flown to the US and prosecuted. An eye-opening look at the dark side of cybercrime and the chilling consequences for technology and national security, CRACK99 reads like a caper-only it's true in every riveting detail.

Transactions on Computational Science XXVI - Special Issue on Cyberworlds and Cybersecurity (Paperback, 1st ed. 2016): Marina... Transactions on Computational Science XXVI - Special Issue on Cyberworlds and Cybersecurity (Paperback, 1st ed. 2016)
Marina L. Gavrilova, C.J. Kenneth Tan, Andres Iglesias, Mikio Shinya, Akemi Galvez, …
R1,313 R1,221 Discovery Miles 12 210 Save R92 (7%) Ships in 10 - 15 working days

This, the 26th issue of the Transactions on Computational Science journal, is comprised of ten extended versions of selected papers from the International Conference on Cyberworlds 2014, held in Santander, Spain, in June 2014. The topics covered include areas of virtual reality, games, social networks, haptic modeling, cybersecurity, and applications in education and arts.

Hacker Techniques, Tools, And Incident Handling (Paperback): Sean Philip Oriyano, Michael Gregg Hacker Techniques, Tools, And Incident Handling (Paperback)
Sean Philip Oriyano, Michael Gregg
R1,937 Discovery Miles 19 370 Ships in 10 - 15 working days

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015): Zhou Lu,... Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015)
Zhou Lu, Wenye Wang, Cliff Wang
R1,501 R1,271 Discovery Miles 12 710 Save R230 (15%) Ships in 10 - 15 working days

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII - Selected Papers from FDSE 2014 (Paperback, 1st ed.... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII - Selected Papers from FDSE 2014 (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Tran Khanh Dang, Nam Thoai
R1,258 R1,167 Discovery Miles 11 670 Save R91 (7%) Ships in 10 - 15 working days

This volume, the 23rd issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems,focuses on information and security engineering. It contains five revised and extended papers selected from the proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, November 19-21, 2014. The titles of the five papers are as follows: A Natural Language Processing Tool for White Collar Crime Investigation; Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae Domain; An Adaptive Similarity Search in Massive Datasets; Semantic Attack on anonymized Transactions; and Private Indexes for Mixed Encrypted Databases.

Cyber Security and Policy - A substantive dialogue (Paperback): Andrew Colarik, Anuradha Mathrani, Julian Jang-Jaccard Cyber Security and Policy - A substantive dialogue (Paperback)
Andrew Colarik, Anuradha Mathrani, Julian Jang-Jaccard
R889 R652 Discovery Miles 6 520 Save R237 (27%) Ships in 10 - 15 working days

Welcome to cyberspace - where all your computing and connection needs are on demand, and where security threats have never been more massive.A world without the advantages and convenience provided by cyberspace and the internet of things is now unimaginable. But do we truly grasp the threats to this massive, interconnected system? And do we really understand how to secure it? After all, cyber security is no longer just a technology problem; the effort to secure systems and society are now one and the same.This book discusses cyber security and cyber policy in an effort to improve the use and acceptance of security services. It argues that a substantive dialogue around cyberspace, cyber security and cyber policy is critical to a better understanding of the serious security issues we face.

IP Cores Design from Specifications to Production - Modeling, Verification, Optimization, and Protection (Hardcover, 1st ed.... IP Cores Design from Specifications to Production - Modeling, Verification, Optimization, and Protection (Hardcover, 1st ed. 2016)
Khaled Salah Mohamed
R2,475 R2,248 Discovery Miles 22 480 Save R227 (9%) Ships in 10 - 15 working days

This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including those associated with many of the most common memory cores, controller IPs and system-on-chip (SoC) buses. Readers will also benefit from the author's practical coverage of new verification methodologies. such as bug localization, UVM, and scan-chain. A SoC case study is presented to compare traditional verification with the new verification methodologies. Discusses the entire life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection; Introduce a deep introduction for Verilog for both implementation and verification point of view. Demonstrates how to use IP in applications such as memory controllers and SoC buses. Describes a new verification methodology called bug localization; Presents a novel scan-chain methodology for RTL debugging; Enables readers to employ UVM methodology in straightforward, practical terms.

Security for Multihop Wireless Networks (Hardcover): Shafiullah Khan, Jaime Lloret Mauri Security for Multihop Wireless Networks (Hardcover)
Shafiullah Khan, Jaime Lloret Mauri
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.

IT Governance - An International Guide to Data Security and ISO 27001/ISO 27002 (Paperback, 7th Revised edition): Alan Calder,... IT Governance - An International Guide to Data Security and ISO 27001/ISO 27002 (Paperback, 7th Revised edition)
Alan Calder, Steve Watkins
R1,453 R1,172 Discovery Miles 11 720 Save R281 (19%) Ships in 10 - 15 working days

Faced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers changes in global regulation, particularly GDPR, and updates to standards in the ISO/IEC 27000 family, BS 7799-3:2017 (information security risk management) plus the latest standards on auditing. It also includes advice on the development and implementation of an ISMS that will meet the ISO 27001 specification and how sector-specific standards can and should be factored in. With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, IT Governance is the definitive guide to implementing an effective information security management and governance system.

Ubiquitous Networking - Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers... Ubiquitous Networking - Third International Symposium, UNet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Essaid Sabir, Ana Garcia Armada, Mounir Ghogho, Merouane Debbah
R2,048 R1,851 Discovery Miles 18 510 Save R197 (10%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions. They were organized in topical sections named: context-awareness and autonomy paradigms; mobile edge networking and virtualization; ubiquitous internet of things: emerging technologies and breakthroughs; and enablers, challenges and applications.

Zero Trust Networks (Paperback): Evan Gilman, Doug Barth Zero Trust Networks (Paperback)
Evan Gilman, Doug Barth
R1,381 R794 Discovery Miles 7 940 Save R587 (43%) Ships in 10 - 15 working days

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network, including how to build one using currently available technology. Understand how the zero trust model embeds security within the system's operation, rather than layering it on top Examine the fundamental concepts at play in a zero trust network, including network agents and trust engines Use existing technology to establish trust among the actors in a network Learn how to migrate from a perimeter-based network to a zero trust network in production Explore case studies of zero trust on the client side (Google) and on the server (PagerDuty)

Official (ISC)2 Guide to the CSSLP CBK (Hardcover, 2nd New edition): Mano Paul Official (ISC)2 Guide to the CSSLP CBK (Hardcover, 2nd New edition)
Mano Paul
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequences-data breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in software development and the new security threats they create. Recognized as one of the best application security tools available for professionals involved in software development, the Official (ISC)2 (R) Guide to the CSSLP (R) CBK (R), Second Edition, is both up-to-date and relevant, reflecting the latest developments in this ever-changing field and providing an intuitive approach to the CSSLP Common Body of Knowledge (CBK). It provides a robust and comprehensive study of the 8 domains of the CBK, covering everything from ensuring software security requirements are included in the software design phase to programming concepts that can effectively protect software from vulnerabilities to addressing issues pertaining to proper testing of software for security, and implementing industry standards and practices to provide a high level of assurance that the supply chain is secure-both up-stream. The book discusses the issues facing software professionals today, such as mobile app development, developing in the cloud, software supply chain risk management, and more. Numerous illustrated examples and practical exercises are included in this book to help the reader understand the concepts within the CBK and to enable them to apply these concepts in real-life situations. Endorsed by (ISC)2 and written and reviewed by CSSLPs and other (ISC)2 members, this book serves as an unrivaled study tool for the certification exam and an invaluable career reference. Earning your CSSLP is an esteemed achievement that validates your efforts in security leadership to help your organization build resilient software capable of combating the security threats of today and tomorrow.

Trust Management XII - 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10-13, 2018,... Trust Management XII - 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10-13, 2018, Proceedings (Hardcover, 1st ed. 2018)
Nurit Gal-Oz, Peter R. Lewis
R2,152 R1,775 Discovery Miles 17 750 Save R377 (18%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2018, held in Toronto, ON, Canada, in July 2018. The 7 revised full papers and 3 short papers presented were carefully reviewed and selected from 22 submissions. The papers feature both theoretical research and real-world case studies and cover the following topical areas: trust in information technology; socio-technical, economic, and sociological trust; trust and reputation management systems; identity management and trust; secure, trustworthy and privacy-aware systems; trust building in large scale systems; and trustworthyness of adaptive systems. Also included is the 2018 William Winsborough commemorative address.

Guide to Network Security, International Edition (Paperback, New edition): Michael Whitman, David Mackey, Herbert Mattord Guide to Network Security, International Edition (Paperback, New edition)
Michael Whitman, David Mackey, Herbert Mattord
R1,343 R1,127 Discovery Miles 11 270 Save R216 (16%) Ships in 15 - 25 working days

GUIDE TO NETWORK SECURITY, International Edition is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY, International Edition is an ideal resource for readers who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future.

How to Speak Tech - The Non-Techie's Guide to Key Technology Concepts (Paperback, 2nd ed.): Vinay Trivedi How to Speak Tech - The Non-Techie's Guide to Key Technology Concepts (Paperback, 2nd ed.)
Vinay Trivedi
R556 R442 Discovery Miles 4 420 Save R114 (21%) Ships in 7 - 11 working days

Things you've done online: ordered a pizza, checked the weather, booked a hotel, and reconnected with long-lost friends. Now it's time to find out how these things work. Vinay Trivedi peels back the mystery of the Internet, explains it all in the simplest terms, and gives you the knowledge you need to speak confidently when the subject turns to technology. This revised second edition of How to Speak Tech employs the strategy of the popular first edition: through the narrative of setting up a fictitious startup, it introduces you to essential tech concepts. New tech topics that were added in this edition include the blockchain, augmented and virtual reality, Internet of Things, and artificial intelligence. The author's key message is: technology isn't beyond the understanding of anyone! By breaking down major tech concepts involved with a modern startup into bite-sized chapters, the author's approach helps you understand topics that aren't always explained clearly and shows you that they aren't rocket science. So go ahead, grab this book, start to "speak tech," and hold your own in any tech-related conversation! What You'll Learn Understand the basics of new and established technologies such as blockchain, artificial intelligence (AI), augmented and virtual reality (AR and VR), Internet of Things (IoT), software development, programming languages, databases, and more Listen intelligently and speak confidently when technologies are brought up in your business Be confident in your grasp of terms and technologies when setting up your own organization's application Who This Book Is For Students who want to understand different technologies relevant to their future careers at startups and established organizations, as well as business and other non-technical professionals who encounter and require an understanding of key technical terms and trends to succeed in their roles Reviews "Finally, a book non-techies can use to understand the technologies that are changing our lives." Paul Bottino, Executive Director, Technology and Entrepreneurship Center, Harvard University "A great book everyone can use to understand how tech startups work." Rene Reinsberg, Founder at Celo; Former VP of Emerging Products, GoDaddy "Through the simplicity of his presentation, Vinay shows that the basics of technology can be straightforwardly understood by anyone who puts in the time and effort to learn." Joseph Lassiter, Professor of Management Science, Harvard Business School and Harvard Innovation Lab

Primer on Client-Side Web Security (Paperback, 2014 ed.): Philippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns Primer on Client-Side Web Security (Paperback, 2014 ed.)
Philippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns
R1,250 R1,143 Discovery Miles 11 430 Save R107 (9%) Ships in 10 - 15 working days

This volume illustrates the continuous arms race between attackers and defenders of the Web ecosystem by discussing a wide variety of attacks. In the first part of the book, the foundation of the Web ecosystem is briefly recapped and discussed. Based on this model, the assets of the Web ecosystem are identified, and the set of capabilities an attacker may have are enumerated. In the second part, an overview of the web security vulnerability landscape is constructed. Included are selections of the most representative attack techniques reported in great detail. In addition to descriptions of the most common mitigation techniques, this primer also surveys the research and standardization activities related to each of the attack techniques, and gives insights into the prevalence of those very attacks. Moreover, the book provides practitioners a set of best practices to gradually improve the security of their web-enabled services. Primer on Client-Side Web Security expresses insights into the future of web application security. It points out the challenges of securing the Web platform, opportunities for future research, and trends toward improving Web security.

ISSE 2014 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference... ISSE 2014 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference (Paperback, 2014 ed.)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R1,784 R1,563 Discovery Miles 15 630 Save R221 (12%) Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2014 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014.

Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings... Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings (Paperback, 2014 ed.)
Liqun Chen, Chris Mitchell
R1,263 R1,186 Discovery Miles 11 860 Save R77 (6%) Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,565 Discovery Miles 15 650
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
Intelligence-Driven Incident Response
Scott Roberts, Rebekah Brown Paperback R1,386 R799 Discovery Miles 7 990
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, … Paperback R946 R578 Discovery Miles 5 780
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Information Theoretic Security and…
Holger Boche, H. Vincent Poor Hardcover R2,555 R2,421 Discovery Miles 24 210
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,353 Discovery Miles 13 530

 

Partners