0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,649)
  • R250 - R500 (732)
  • R500+ (5,136)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Network Attacks and Exploitation - A Framework (Paperback): Matthew Monte Network Attacks and Exploitation - A Framework (Paperback)
Matthew Monte
R876 Discovery Miles 8 760 Ships in 10 - 15 working days

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them. * Understand the fundamental concepts of computer network exploitation * Learn the nature and tools of systematic attacks * Examine offensive strategy and how attackers will seek to maintain their advantage * Understand defensive strategy, and how current approaches fail to change the strategic balance Governments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offense or a strategically sound defense against attacks and exploitation. For a clear roadmap to better network security, Network Attacks and Exploitation is your complete and practical guide.

Cyber Attack (Hardcover): Paul Day Cyber Attack (Hardcover)
Paul Day
R456 R313 Discovery Miles 3 130 Save R143 (31%) Ships in 10 - 15 working days

There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Computers and computer systems rule our lives, and it is impossible to imagine life without them. But as society has become evermore dependent, both economically and politically, on the electronic flow of information, it has made us vulnerable to the real and destabilizing threat of cyber attack - the extremes of which could see us having to exist without power, vital resources and communications. Confronting this terrifying reality, Cyber Attack explores the digital dangers we face and examines the extremes they could reach. The book also investigates who is responsible and what can be done to protect us. Cyber Attack is written by bestselling author Paul Day, a former hacker turned leading computer security expert, and covers all areas of digital menace. What you learn in this book will make you think again next time you make an online transaction or send sensitive information from your smart phone. "The extent of what is going on is astonishing - with industrial size processes involving many thousands of people lying behind state-sponsored cyber espionage and organised cyber crime" Jonathan Evans, former Director General of MI5.

Introduction to Computer Security: Pearson New International Edition (Paperback, Pearson New International Edition): Michael... Introduction to Computer Security: Pearson New International Edition (Paperback, Pearson New International Edition)
Michael Goodrich, Roberto Tamassia
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to students of all levels.

CompTIA CySA+ Practice Tests - Exam CS0-001 (Paperback): Mike Chapple, David Seidl CompTIA CySA+ Practice Tests - Exam CS0-001 (Paperback)
Mike Chapple, David Seidl
R933 R579 Discovery Miles 5 790 Save R354 (38%) Ships in 10 - 15 working days

1,000 practice questions for smart CompTIA CySA+ preparation CompTIA CySA+ Practice Tests provides invaluable preparation for the Cybersecurity Analyst exam CS0-001. With 1,000 questions covering 100% of the exam objectives, this book offers a multitude of opportunities for the savvy CySA+ candidate. Prepare more efficiently by working through questions before you begin studying, to find out what you already knowand focus study time only on what you don't. Test yourself periodically to gauge your progress along the way, and finish up with a 'dry-run' of the exam to avoid surprises on the big day. These questions are organized into four full-length tests, plus two bonus practice exams that show you what to expect and help you develop your personal test-taking strategy. Each question includes full explanations to help you understand the reasoning and approach, and reduces the chance of making the same error twice. The CySA+ exam tests your knowledge and skills related to threat management, vulnerability management, cyber incident response, and security architecture and tools. You may think you're prepared, but are you absolutely positive? This book gives you an idea of how you are likely to perform on the actual examwhile there's still time to review. Test your understanding of all CySA+ exam domains Pinpoint weak areas in need of review Assess your level of knowledge before planning your study time Learn what to expect on exam day The CompTIA CySA+ certification validates your skill set in the cybersecurity arena. As security becomes more and more critical, the demand for qualified professionals will only rise. CompTIA CySA+ Practice Tests is an invaluable tool for the comprehensive Cybersecurity Analyst preparation that helps you earn that career-making certification.

SAP HANA 2.0 Security Guide (Hardcover, Second Edition): Jonathan Haun SAP HANA 2.0 Security Guide (Hardcover, Second Edition)
Jonathan Haun
R1,778 R1,335 Discovery Miles 13 350 Save R443 (25%) Ships in 7 - 11 working days

Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces. Highlights include: 1) SAP HANA cockpit 2) Privileges 3) Catalog objects 4) User accounts 5) Roles 6) Authentication 7) Certificate management 8) Encryption 9) Lifecycle management 10) Auditing 11) Security tracing.

#deleted - Big Tech's Battle to Erase the Trump Movement and Steal the Election (Standard format, CD): Allum Bokhari #deleted - Big Tech's Battle to Erase the Trump Movement and Steal the Election (Standard format, CD)
Allum Bokhari
R781 R558 Discovery Miles 5 580 Save R223 (29%) Ships in 7 - 11 working days
Cybersecurity Essentials (Paperback): Charles J. Brooks, Christopher Grow, Philip Craig, Donald D. Short Cybersecurity Essentials (Paperback)
Charles J. Brooks, Christopher Grow, Philip Craig, Donald D. Short
R946 R605 Discovery Miles 6 050 Save R341 (36%) Ships in 10 - 15 working days

An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. * Learn security and surveillance fundamentals * Secure and protect remote access and devices * Understand network topologies, protocols, and strategies * Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

The Art of Deception - Controlling the Human Element of Security (Paperback, New ed): Kevin D. Mitnick, William L Simon The Art of Deception - Controlling the Human Element of Security (Paperback, New ed)
Kevin D. Mitnick, William L Simon; Foreword by Steve Wozniak
R319 R217 Discovery Miles 2 170 Save R102 (32%) Ships in 10 - 15 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Handbook on Data Centers (Hardcover, 2015 ed.): Samee U. Khan, Albert Y. Zomaya Handbook on Data Centers (Hardcover, 2015 ed.)
Samee U. Khan, Albert Y. Zomaya
R6,312 R5,225 Discovery Miles 52 250 Save R1,087 (17%) Ships in 10 - 15 working days

This handbook offers a comprehensive review of the state-of-the-art research achievements in the field of data centers. Contributions from international, leading researchers and scholars offer topics in cloud computing, virtualization in data centers, energy efficient data centers, and next generation data center architecture. It also comprises current research trends in emerging areas, such as data security, data protection management, and network resource management in data centers. Specific attention is devoted to industry needs associated with the challenges faced by data centers, such as various power, cooling, floor space, and associated environmental health and safety issues, while still working to support growth without disrupting quality of service. The contributions cut across various IT data technology domains as a single source to discuss the interdependencies that need to be supported to enable a virtualized, next-generation, energy efficient, economical, and environmentally friendly data center. This book appeals to a broad spectrum of readers, including server, storage, networking, database, and applications analysts, administrators, and architects. It is intended for those seeking to gain a stronger grasp on data center networks: the fundamental protocol used by the applications and the network, the typical network technologies, and their design aspects. The Handbook of Data Centers is a leading reference on design and implementation for planning, implementing, and operating data center networks.

Cognitive Superiority - Information to Power (Hardcover, 1st ed. 2021): Dean S. Hartley III, Kenneth O Jobson Cognitive Superiority - Information to Power (Hardcover, 1st ed. 2021)
Dean S. Hartley III, Kenneth O Jobson
R1,819 Discovery Miles 18 190 Ships in 7 - 11 working days

In a world of accelerating unending change, perpetual surveillance, and increasing connectivity, conflict has become ever more complex. Wars are no longer limited to the traditional military conflict domains-land, sea, air; even space and cyber space. The new battlefield will be the cognitive domain and the new conflict a larger contest for power; a contest for cognitive superiority. Written by experts in military operations research and neuropsychology, this book introduces the concept of cognitive superiority and provides the keys to succeeding within a complex matrix where the only rules are the laws of physics, access to information, and the boundaries of cognition. The book describes the adversarial environment and how it interacts with the ongoing, accelerating change that we are experiencing, irrespective of adversaries. It talks about the ascendant power of information access, pervasive surveillance, personalized persuasion, and emerging new forms of cognition. It profiles salient technologies and science, including persuasion science, artificial intelligence and machine learning (AI/ML), surveillance technologies, complex adaptive systems, network science, directed human modification, and biosecurity. Readers will learn about human and machine cognition, what makes it tick, and why and how we and our technologies are vulnerable. Following in the tradition of Sun-Tsu and von Clausewitz, this book writes a new chapter in the study of warfare and strategy. It is written for those who lead, aspire to leadership, and those who teach or persuade, especially in the fields of political science, military science, computer science, and business.

Computer Networking for LANS to WANS - Hardware, Software and Security, International Edition (Paperback, New edition): James... Computer Networking for LANS to WANS - Hardware, Software and Security, International Edition (Paperback, New edition)
James Antonakos, Kenneth Mansfield, Jr.
R1,011 R867 Discovery Miles 8 670 Save R144 (14%) Ships in 15 - 25 working days

Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY, International Edition provides comprehensive coverage of all aspects of networking. This book contains 24 chapters illustrating network hardware and software, network operating systems, multimedia and the Internet, and computer and network security and forensics. Six appendices provide coverage of the history of the Internet, the ASCII code, the operation of MODEMs, tips on becoming certified in network, security, and forensics, telecommunication technologies, and setting up a computer repair shop. A companion CD includes numerous videos and files that allow the reader to perform important hands-on networking, security, and forensic activities.

Critical Infrastructure Protection VIII - 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March... Critical Infrastructure Protection VIII - 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers (Hardcover, 2014 ed.)
Jonathan Butts, Sujeet Shenoi
R2,030 Discovery Miles 20 300 Ships in 10 - 15 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection VIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: control systems security, infrastructure security, infrastructure modeling and simulation, risk and impact assessment, and advanced techniques. This book is the eighth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, DC, USA in the spring of 2014. Critical Infrastructure Protection VIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Interference Management in Wireless Networks - Fundamental Bounds and the Role of Cooperation (Hardcover): Venugopal V.... Interference Management in Wireless Networks - Fundamental Bounds and the Role of Cooperation (Hardcover)
Venugopal V. Veeravalli, Aly El Gamal
R1,886 Discovery Miles 18 860 Ships in 10 - 15 working days

Learn about an information-theoretic approach to managing interference in future generation wireless networks. Focusing on cooperative schemes motivated by Coordinated Multi-Point (CoMP) technology, the book develops a robust theoretical framework for interference management that uses recent advancements in backhaul design, and practical pre-coding schemes based on local cooperation, to deliver the increased speed and reliability promised by interference alignment. Gain insight into how simple, zero-forcing pre-coding schemes are optimal in locally connected interference networks, and discover how significant rate gains can be obtained by making cell association decisions and allocating backhaul resources based on centralized (cloud) processing and knowledge of network topology. Providing a link between information-theoretic analyses and interference management schemes that are easy to implement, this is an invaluable resource for researchers, graduate students and practicing engineers in wireless communications.

Trust Management VIII - 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings... Trust Management VIII - 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings (Hardcover, 2014 ed.)
Jianying Zhou, Nurit Gal-Oz, Jie Zhang, Ehud Gudes
R1,995 Discovery Miles 19 950 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2014, held in Singapore, in July 2014. The 12 revised full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. In addition, the book contains one invited paper. The papers cover a wide range of topics focusing on the following main areas: trust and reputation models; privacy issues and social and behavioral models of trust; the relationship between trust and security; trust under attacks and trust in the cloud environment.

Data Localization Laws and Policy - The EU Data Protection International Transfers Restriction Through a Cloud Computing Lens... Data Localization Laws and Policy - The EU Data Protection International Transfers Restriction Through a Cloud Computing Lens (Hardcover)
W. Kuan Hon
R3,623 Discovery Miles 36 230 Ships in 10 - 15 working days

Countries are increasingly introducing data localization laws and data export restrictions, threatening digital globalization and inhibiting cloud computing's adoption despite its acknowledged benefits. Through a cloud computing lens, this multi-disciplinary book examines the personal data transfers restriction under the EU Data Protection Directive (including the EU-US Privacy Shield and General Data Protection Regulation). It covers historical objectives and practical problems, showing why the focus should move from physical data location to effective jurisdiction over those controlling access to intelligible data and control of access to data through security measures. The book further discusses data localization laws' failure to solve concerns regarding the topical and contentious issue of mass state surveillance. Its arguments are also relevant to other data localization laws, cross-border transfers of non personal data and transfers not involving cloud computing. Comprehensive yet accessible, this book is of great value to academics in law, policy, computer science and technology. It is also highly relevant to cloud computing/technology organisations and other businesses in the EU and beyond, data privacy professionals, policymakers and regulators.

The Official (ISC)2 Guide to the CISSP CBK Reference (Hardcover, 5th Edition): John Warsinske, Mark Graff, Kevin Henry,... The Official (ISC)2 Guide to the CISSP CBK Reference (Hardcover, 5th Edition)
John Warsinske, Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, …
R1,763 Discovery Miles 17 630 Ships in 10 - 15 working days

The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the new eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Written by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: Common and good practices for each objective Common vocabulary and definitions References to widely accepted computing standards Highlights of successful approaches through case studies Whether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.

Tribe of Hackers - Cybersecurity Advice from the Best Hackers in the World (Paperback): Marcus J. Carey, Jennifer Jin Tribe of Hackers - Cybersecurity Advice from the Best Hackers in the World (Paperback)
Marcus J. Carey, Jennifer Jin
R498 R373 Discovery Miles 3 730 Save R125 (25%) Ships in 10 - 15 working days

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product. Looking for real-world advice from leading cybersecurity experts? You've found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world's most noteworthy hackers and influential security specialists.

CompTIA CySA+ Study Guide - Exam CS0-001 (Paperback): Mike Chapple, David Seidl CompTIA CySA+ Study Guide - Exam CS0-001 (Paperback)
Mike Chapple, David Seidl
R1,236 R860 Discovery Miles 8 600 Save R376 (30%) Ships in 10 - 15 working days

Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all exam objectives for the new CSA+ certification. The CSA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with a goal of securing and protecting organizations systems. Focus your review for the CSA+ with Sybex and benefit from real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions help you gauge your understanding each step of the way. You also gain access to the Sybex interactive learning environment that includes electronic flashcards, a searchable glossary, and hundreds of bonus practice questions. This study guide provides the guidance and knowledge you need to demonstrate your skill set in cybersecurity. Key exam topics include: * Threat management * Vulnerability management * Cyber incident response * Security architecture and toolsets

Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Hardcover): K.R. Rao, Zoran S. Bojkovic,... Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Hardcover)
K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz
R5,542 Discovery Miles 55 420 Ships in 10 - 15 working days

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids. Offering an accessible treatment of the latest research, this book: Presents specific wireless multimedia communication schemes that have proven to be useful Discusses important standardization processing activities regarding wireless networking Includes wireless mesh and multimedia sensor network architectures, protocols, and design optimizations Highlights the challenges associated with meeting complex connectivity requirements Contains numerous figures, tables, examples, references, and a glossary of acronyms Providing coverage of significant technological advances in their initial steps along with a survey of the fundamental principles and practices, Wireless Multimedia Communication Systems: Design, Analysis, and Implementation aids senior-level and graduate-level engineering students and practicing professionals in understanding the processes and furthering the development of today's wireless multimedia communication systems.

Kali Linux Revealed - Mastering the Penetration Testing Distribution (Paperback): Raphael Hertzog, Mati Aharoni, Jim... Kali Linux Revealed - Mastering the Penetration Testing Distribution (Paperback)
Raphael Hertzog, Mati Aharoni, Jim O'Gorman
R595 Discovery Miles 5 950 Ships in 7 - 11 working days
IBM i Security Administration and Compliance (Paperback): Carol Woodbury IBM i Security Administration and Compliance (Paperback)
Carol Woodbury
R1,382 R1,034 Discovery Miles 10 340 Save R348 (25%) Ships in 7 - 11 working days
Networks, Security and Complexity - The Role of Public Policy in Critical Infrastructure Protection (Hardcover): Sean P. Gorman Networks, Security and Complexity - The Role of Public Policy in Critical Infrastructure Protection (Hardcover)
Sean P. Gorman
R2,465 Discovery Miles 24 650 Ships in 10 - 15 working days

The end of the 20th century witnessed an information revolution that introduced a host of new economic efficiencies. This economic change was underpinned by rapidly growing networks of infrastructure that have become increasingly complex. In this new era of global security we are now forced to ask whether our private efficiencies have led to public vulnerabilities, and if so, how do we make ourselves secure without hampering the economy. In order to answer these questions, Sean Gorman provides a framework for how vulnerabilities are identified and cost-effectively mitigated, as well as how resiliency and continuity of infrastructures can be increased. Networks, Security and Complexity goes on to address specific concerns such as determining criticality and interdependency, the most effective means of allocating scarce resources for defense, and whether diversity is a viable strategy. The author provides the economic, policy, and physics background to the issues of infrastructure security, along with tools for taking first steps in tackling these security dilemmas. He includes case studies of infrastructure failures and vulnerabilities, an analysis of threats to US infrastructure, and a review of the economics and geography of agglomeration and efficiency. This critical and controversial book will garner much attention and spark an important dialogue. Policymakers, security professionals, infrastructure operators, academics, and readers following homeland security issues will find this volume of great interest.

SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285 (Paperback): Todd Lammle,... SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide - Exam 500-285 (Paperback)
Todd Lammle, Alex Tatistcheff, John Gay
R1,400 R958 Discovery Miles 9 580 Save R442 (32%) Ships in 10 - 15 working days

Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285, provides 100% coverage of the FirePOWER with Advanced FireSIGHT Administration exam objectives. With clear and concise information regarding crucial next-generation network security topics, this comprehensive guide includes practical examples and insights drawn from real-world experience, exam highlights, and end of chapter reviews. Learn key exam topics and powerful features of the Cisco FirePOWER Services, including FireSIGHT Management Center, in-depth event analysis, IPS tuning and configuration, and snort rules language. Gain access to Sybex's superior online learning environment that includes practice questions, flashcards, and interactive glossary of terms. * Use and configure next-generation Cisco FirePOWER services, including application control, firewall, and routing and switching capabilities * Understand how to accurately tune your systems to improve performance and network intelligence while leveraging powerful tools for more efficient event analysis * Complete hands-on labs to reinforce key concepts and prepare you for the practical applications portion of the examination * Access Sybex's online interactive learning environment and test bank, which includes an assessment test, chapter tests, bonus practice exam questions, electronic flashcards, and a searchable glossary Securing Cisco Networks with Sourcefire IPS Study Guide, Exam 500-285 provides you with the information you need to prepare for the FirePOWER with Advanced FireSIGHT Administration examination.

Securing Office 365 - Masterminding MDM and Compliance in the Cloud (Paperback, 1st ed.): Matthew Katzer Securing Office 365 - Masterminding MDM and Compliance in the Cloud (Paperback, 1st ed.)
Matthew Katzer
R1,143 R885 Discovery Miles 8 850 Save R258 (23%) Ships in 7 - 11 working days

Understand common security pitfalls and discover weak points in your organization's data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office. Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today's electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business. What You'll Learn Manage security with the Azure Security Center and the Office 365 Compliance Center Configure information protection for document and electronic communications Monitor security for your business in the cloud Understand Mobile Application Management (MAM) and Mobile Device Management (MDM) Prevent data loss in Office 365 Configure and manage the compliance manager tools for NIST and GDPR Who This Book Is For IT managers and compliance and cybersecurity officers who have responsibility for compliance and data security in their business

Managing Cybersecurity Risk - Book 3 (Paperback): Jonathan Reuvid Managing Cybersecurity Risk - Book 3 (Paperback)
Jonathan Reuvid
R1,023 R784 Discovery Miles 7 840 Save R239 (23%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Social Engineering - The Science of…
Christopher Hadnagy Paperback R789 R499 Discovery Miles 4 990
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,116 Discovery Miles 11 160
(ISC)2 CISSP Certified Information…
Mike Chapple, David Seidl, … Paperback R1,903 R1,329 Discovery Miles 13 290
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R902 Discovery Miles 9 020
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
Codes, Cryptology and Curves with…
Ruud Pellikaan, Xin-Wen Wu, … Paperback R1,302 Discovery Miles 13 020
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R123 Discovery Miles 1 230
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
Linking Sensitive Data - Methods and…
Peter Christen, Thilina Ranbaduge, … Hardcover R3,369 Discovery Miles 33 690
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,671 Discovery Miles 16 710

 

Partners