0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,505)
  • R250 - R500 (664)
  • R500+ (4,503)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Cyber Privacy - Who Has Your Data  and Why You Should Care (Hardcover): April Falcon Doss Cyber Privacy - Who Has Your Data and Why You Should Care (Hardcover)
April Falcon Doss
R567 R454 Discovery Miles 4 540 Save R113 (20%) Ships in 7 - 11 working days

You're being tracked. Amazon, Google, Facebook, governments. No matter who we are or where we go, someone is collecting our data: to profile us, target us, assess us; to predict our behavior and analyze our attitudes; to influence the things we do and buy-even to impact our vote. If this makes you uneasy, it should. We live in an era of unprecedented data aggregation, and it's never been more difficult to navigate the trade-offs between individual privacy, personal convenience, national security, and corporate profits. Technology is evolving quickly, while laws and policies are changing slowly. You shouldn't have to be a privacy expert to understand what happens to your data. April Falcon Doss, a privacy expert and former NSA and Senate lawyer, has seen this imbalance in action. She wants to empower individuals and see policy catch up. In Cyber Privacy, Doss demystifies the digital footprints we leave in our daily lives and reveals how our data is being used-sometimes against us-by the private sector, the government, and even our employers and schools. She explains the trends in data science, technology, and the law that impact our everyday privacy. She tackles big questions: how data aggregation undermines personal autonomy, how to measure what privacy is worth, and how society can benefit from big data while managing its risks and being clear-eyed about its cost. It's high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us. This book is for readers who want answers to three questions: Who has your data? Why should you care? And most important, what can you do about it?

Applications of Secure Multiparty Computation (Hardcover): Peeter Laud, Liina Kamm Applications of Secure Multiparty Computation (Hardcover)
Peeter Laud, Liina Kamm
R2,236 Discovery Miles 22 360 Ships in 10 - 15 working days
Danger Keep Out Password Keeper - Security Internet Username & Password Keeper Logbook Passkey Record Journal Notebook Novelty... Danger Keep Out Password Keeper - Security Internet Username & Password Keeper Logbook Passkey Record Journal Notebook Novelty Birthday Gift for Dad (Paperback)
Dream Journals
R122 Discovery Miles 1 220 In stock
Progress in Cryptology -- AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7,... Progress in Cryptology -- AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedings (Paperback, Edition.)
Abderrahmane Nitaj, David Pointcheval
R2,104 Discovery Miles 21 040 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011. The 23 papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. They are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs.

Large-Scale Data Analytics (Hardcover, 2014 ed.): Aris Gkoulalas-Divanis, Abderrahim Labbi Large-Scale Data Analytics (Hardcover, 2014 ed.)
Aris Gkoulalas-Divanis, Abderrahim Labbi
R3,140 R2,591 Discovery Miles 25 910 Save R549 (17%) Ships in 10 - 15 working days

This edited book collects state-of-the-art research related to large-scale data analytics that has been accomplished over the last few years. This is among the first books devoted to this important area based on contributions from diverse scientific areas such as databases, data mining, supercomputing, hardware architecture, data visualization, statistics, and privacy. There is increasing need for new approaches and technologies that can analyze and synthesize very large amounts of data, in the order of petabytes, that are generated by massively distributed data sources. This requires new distributed architectures for data analysis. Additionally, the heterogeneity of such sources imposes significant challenges for the efficient analysis of the data under numerous constraints, including consistent data integration, data homogenization and scaling, privacy and security preservation. The authors also broaden reader understanding of emerging real-world applications in domains such as customer behavior modeling, graph mining, telecommunications, cyber-security, and social network analysis, all of which impose extra requirements for large-scale data analysis. Large-Scale Data Analytics is organized in 8 chapters, each providing a survey of an important direction of large-scale data analytics or individual results of the emerging research in the field. The book presents key recent research that will help shape the future of large-scale data analytics, leading the way to the design of new approaches and technologies that can analyze and synthesize very large amounts of heterogeneous data. Students, researchers, professionals and practitioners will find this book an authoritative and comprehensive resource.

Industry of Anonymity - Inside the Business of Cybercrime (Hardcover): Jonathan Lusthaus Industry of Anonymity - Inside the Business of Cybercrime (Hardcover)
Jonathan Lusthaus
R859 R776 Discovery Miles 7 760 Save R83 (10%) Ships in 10 - 15 working days

The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world's technology-crime hotspots. Cybercrime seems invisible. Attacks arrive out of nowhere, their origins hidden by layers of sophisticated technology. Only the victims are clear. But every crime has its perpetrator-specific individuals or groups sitting somewhere behind keyboards and screens. Jonathan Lusthaus lifts the veil on the world of these cybercriminals in the most extensive account yet of the lives they lead, and the vast international industry they have created. We are long past the age of the lone adolescent hacker tapping away in his parents' basement. Cybercrime now operates like a business. Its goods and services may be illicit, but it is highly organized, complex, driven by profit, and globally interconnected. Having traveled to cybercrime hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, Lusthaus takes us inside this murky underworld and reveals how this business works. He explains the strategies criminals use to build a thriving industry in a low-trust environment characterized by a precarious combination of anonymity and teamwork. Crime takes hold where there is more technical talent than legitimate opportunity, and where authorities turn a blind eye-perhaps for a price. In the fight against cybercrime, understanding what drives people into this industry is as important as advanced security. Based on seven years of fieldwork from Eastern Europe to West Africa, Industry of Anonymity is a compelling and revealing study of a rational business model which, however much we might wish otherwise, has become a defining feature of the modern world.

CSSLP Certification All-in-One Exam Guide, Second Edition (Paperback, 2nd edition): Wm. Arthur Conklin, Daniel Shoemaker CSSLP Certification All-in-One Exam Guide, Second Edition (Paperback, 2nd edition)
Wm. Arthur Conklin, Daniel Shoemaker
R1,521 R900 Discovery Miles 9 000 Save R621 (41%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This self-study guide delivers 100% coverage of all domainsin the the CSSLP exam Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP Certification All-in-One Exam Guide, Second Edition covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC)2 (R). You'll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference. Covers all eight exam domains: *Secure Software Concepts*Secure Software Requirements*Secure Software Design*Secure Software Implementation/Programming*Secure Software Testing*Software Lifecycle Management*Software Deployment, Operations, and Maintenance*Supply Chain and Software Acquisition Online content includes: *Test engine that provides full-length practice exams or customized quizzes by chapter or exam domain

Microsoft Windows Security Essentials (Paperback): Darril Gibson Microsoft Windows Security Essentials (Paperback)
Darril Gibson
R822 R565 Discovery Miles 5 650 Save R257 (31%) Ships in 10 - 15 working days

Windows security concepts and technologies for IT beginners

IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built.

This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skillsOffers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and moreReviews all the topics you need to know for taking the MTA 98-367 examProvides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers

If you're new to IT and interested in entering the IT workforce, then "Microsoft Windows Security Essentials" is essential reading.

Cybersecurity For Dummies (Paperback): Joseph Steinberg Cybersecurity For Dummies (Paperback)
Joseph Steinberg
R514 R416 Discovery Miles 4 160 Save R98 (19%) Ships in 7 - 11 working days

Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime -- and to defend yourself before it is too late.

Computer Security -- ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25,... Computer Security -- ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (Paperback, 1st ed. 2015)
Gunther Pernul, Peter Y. A. Ryan, Edgar Weippl
R2,170 R2,018 Discovery Miles 20 180 Save R152 (7%) Ships in 10 - 15 working days

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.

Digital Forensics Basics - A Practical Guide Using Windows OS (Paperback, 1st ed.): Nihad A. Hassan Digital Forensics Basics - A Practical Guide Using Windows OS (Paperback, 1st ed.)
Nihad A. Hassan
R814 R636 Discovery Miles 6 360 Save R178 (22%) Ships in 7 - 11 working days

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You'll Learn Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques Who This Book Is For Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals

The Art of Invisibility - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data... The Art of Invisibility - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Paperback)
Kevin D. Mitnick, Robert Vamosi; Foreword by Mikko Hypponen 1
R388 R322 Discovery Miles 3 220 Save R66 (17%) Ships in 7 - 11 working days

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition (Paperback, 3rd edition): Joel Scambray Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition (Paperback, 3rd edition)
Joel Scambray
R1,107 R850 Discovery Miles 8 500 Save R257 (23%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to: Establish business relevance and context for security by highlighting real-world risks Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services See up close how professional hackers reverse engineer and develop new Windows exploits Identify and eliminate rootkits, malware, and stealth software Fortify SQL Server against external and insider attacks Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions (Paperback, Ed): Rich Cannings, Himanshu Dwivedi, Zane Lackey Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions (Paperback, Ed)
Rich Cannings, Himanshu Dwivedi, Zane Lackey
R1,029 R788 Discovery Miles 7 880 Save R241 (23%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings. Plug security holes in Web 2.0 implementations the proven Hacking Exposed way Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks Circumvent XXE, directory traversal, and buffer overflow exploits Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons Use input validators and XML classes to reinforce ASP and .NET security Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks

Hardware Security - A Hands-on Learning Approach (Paperback): Swarup Bhunia, Mark Tehranipoor Hardware Security - A Hands-on Learning Approach (Paperback)
Swarup Bhunia, Mark Tehranipoor
R2,024 R1,741 Discovery Miles 17 410 Save R283 (14%) Ships in 10 - 15 working days

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.

Data Science For Cyber-security (Hardcover): Niall M Adams, Nicholas A Heard, Patrick Rubin-delanchy, Mellisa Turcotte Data Science For Cyber-security (Hardcover)
Niall M Adams, Nicholas A Heard, Patrick Rubin-delanchy, Mellisa Turcotte
R2,635 R2,454 Discovery Miles 24 540 Save R181 (7%) Ships in 10 - 15 working days

Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.The application of statistical and broader data science techniques provides an exciting growth area in the design of cyber defences. Networks of connected devices, such as enterprise computer networks or the wider so-called Internet of Things, are all vulnerable to misuse and attack, and data science methods offer the promise to detect such behaviours from the vast collections of cyber traffic data sources that can be obtained. In many cases, this is achieved through anomaly detection of unusual behaviour against understood statistical models of normality.This volume presents contributed papers from an international conference of the same name held at Imperial College. Experts from the field have provided their latest discoveries and review state of the art technologies.

Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R3,004 R2,687 Discovery Miles 26 870 Save R317 (11%) Ships in 10 - 15 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Adversarial Machine Learning (Paperback): Yevgeniy Vorobeychik, Murat Kantarcioglu Adversarial Machine Learning (Paperback)
Yevgeniy Vorobeychik, Murat Kantarcioglu; Series edited by Ronald Brachman, Peter Stone, Francesca Rossi
R1,498 Discovery Miles 14 980 Ships in 7 - 11 working days

The increasing abundance of large high-quality datasets, combined with significant technical advances over the last several decades have made machine learning into a major tool employed across a broad array of tasks including vision, language, finance, and security. However, success has been accompanied with important new challenges: many applications of machine learning are adversarial in nature. Some are adversarial because they are safety critical, such as autonomous driving. An adversary in these applications can be a malicious party aimed at causing congestion or accidents, or may even model unusual situations that expose vulnerabilities in the prediction engine. Other applications are adversarial because their task and/or the data they use are. For example, an important class of problems in security involves detection, such as malware, spam, and intrusion detection. The use of machine learning for detecting malicious entities creates an incentive among adversaries to evade detection by changing their behavior or the content of malicius objects they develop. The field of adversarial machine learning has emerged to study vulnerabilities of machine learning approaches in adversarial settings and to develop techniques to make learning robust to adversarial manipulation. This book provides a technical overview of this field. After reviewing machine learning concepts and approaches, as well as common use cases of these in adversarial settings, we present a general categorization of attacks on machine learning. We then address two major categories of attacks and associated defenses: decision-time attacks, in which an adversary changes the nature of instances seen by a learned model at the time of prediction in order to cause errors, and poisoning or training time attacks, in which the actual training dataset is maliciously modified. In our final chapter devoted to technical content, we discuss recent techniques for attacks on deep learning, as well as approaches for improving robustness of deep neural networks. We conclude with a discussion of several important issues in the area of adversarial learning that in our view warrant further research. Given the increasing interest in the area of adversarial machine learning, we hope this book provides readers with the tools necessary to successfully engage in research and practice of machine learning in adversarial settings.

Secret Passwords - Internet Record Book to Organize Passwords, Pins, Logins, Usernames, and Security Questions (Paperback):... Secret Passwords - Internet Record Book to Organize Passwords, Pins, Logins, Usernames, and Security Questions (Paperback)
Weareads Books
R120 Discovery Miles 1 200 Ships in 7 - 11 working days
Guide to Computer Network Security (Hardcover, 5th ed. 2020): Joseph Migga Kizza Guide to Computer Network Security (Hardcover, 5th ed. 2020)
Joseph Migga Kizza
R1,975 Discovery Miles 19 750 Ships in 7 - 11 working days

This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts. Topics and features: Explores the full range of security risks and vulnerabilities in all connected digital systems Inspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systems Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Describes the fundamentals of traditional computer network security, and common threats to security Reviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systems Discusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchain Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.

The Hacker-Proof Internet Address Password Book - Phonograph - Alphabetical Website Username & Password Organizer Logbook... The Hacker-Proof Internet Address Password Book - Phonograph - Alphabetical Website Username & Password Organizer Logbook Notebook (Paperback)
Atlantic Journals
R161 Discovery Miles 1 610 Ships in 7 - 11 working days
Wireshark 101 - Essential Skills for Network Analysis (Paperback, 2nd ed.): Laura Chappell Wireshark 101 - Essential Skills for Network Analysis (Paperback, 2nd ed.)
Laura Chappell; Foreword by Gerald Combs
R1,231 Discovery Miles 12 310 Ships in 7 - 11 working days
Computer and Information Security Handbook (Hardcover, 2nd edition): John R Vacca Computer and Information Security Handbook (Hardcover, 2nd edition)
John R Vacca
R2,571 R2,198 Discovery Miles 21 980 Save R373 (15%) Ships in 10 - 15 working days

Thesecond editionof this comprehensive handbook of computer and information securityprovides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors respective areas of expertise.

The book is organized into10 parts comprised of70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.
Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions"

High Performance Cloud Auditing and Applications (Hardcover, 2014 ed.): Keesook J Han, Baek-Young Choi, Sejun Song High Performance Cloud Auditing and Applications (Hardcover, 2014 ed.)
Keesook J Han, Baek-Young Choi, Sejun Song
R4,469 R3,819 Discovery Miles 38 190 Save R650 (15%) Ships in 10 - 15 working days

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: * Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures * Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies * Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets

Discreet Password Book - Never Forget A Password Again! 5.5" x 8.5" Colorful Cute Bears Design, Small Password Book With Tabbed... Discreet Password Book - Never Forget A Password Again! 5.5" x 8.5" Colorful Cute Bears Design, Small Password Book With Tabbed Large Alphabet, Pocket-Size Over 340 Record User And Password (Large print, Paperback, Large type / large print edition)
Ellie And Scott
R131 Discovery Miles 1 310 Ships in 7 - 11 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, … Paperback R946 R578 Discovery Miles 5 780
Codes, Cryptology and Curves with…
Ruud Pellikaan, Xin-Wen Wu, … Paperback R1,237 Discovery Miles 12 370
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,565 Discovery Miles 15 650
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R123 Discovery Miles 1 230
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,353 Discovery Miles 13 530

 

Partners