0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,649)
  • R250 - R500 (732)
  • R500+ (5,136)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Privacy and Identity Management for Emerging Services and Technologies - 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6... Privacy and Identity Management for Emerging Services and Technologies - 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers (Hardcover, 2014 ed.)
Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse
R1,999 Discovery Miles 19 990 Ships in 10 - 15 working days

This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected from a total of 30 presentations and 11 keynote talks and were subject to a two-step review process. The keynote papers cover the dramatic global changes, including legislative developments that society is facing today. Privacy and identity management are explored in specific settings, such as the corporate context, civic society, and education and using particular technologies such as cloud computing. The regular papers examine the challenges to privacy, security and identity; ways of preserving privacy; identity and identity management and the particular challenges presented by social media.

Advances in Data Sciences, Security and Applications - Proceedings of ICDSSA 2019 (Hardcover, 1st ed. 2020): Vanita Jain, Gopal... Advances in Data Sciences, Security and Applications - Proceedings of ICDSSA 2019 (Hardcover, 1st ed. 2020)
Vanita Jain, Gopal Chaudhary, M. Cengiz Taplamacioglu, M.S. Agarwal
R6,272 Discovery Miles 62 720 Ships in 7 - 11 working days

This book gathers the best papers presented at the International Conference on Data Sciences, Security and Applications (ICDSSA 2019), organized by Bharati Vidyapeeth's College of Engineering, New Delhi, India, on 7-8 March 2019. The respective contributions present original research work, essential information, techniques and applications in the fields of data mining, artificial intelligence and computational intelligence. They also discuss machine learning in business intelligence and big data analytics, soft computing, security, cloud computing and the latest trends.

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (Paperback, 2nd Edition): Ben Malisow (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (Paperback, 2nd Edition)
Ben Malisow
R1,194 R910 Discovery Miles 9 100 Save R284 (24%) Ships in 7 - 11 working days

The only official study guide for the new CCSP exam (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Architectural Concepts and Design Requirements, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Operations, and Legal and Compliance with real-world scenarios to help you apply your skills along the way. The CCSP is the latest credential from (ISC)2 and the Cloud Security Alliance, designed to show employers that you have what it takes to keep their organization safe in the cloud. Learn the skills you need to be confident on exam day and beyond. Review 100% of all CCSP exam objectives Practice applying essential concepts and skills Access the industry-leading online study tool set Test your knowledge with bonus practice exams and more As organizations become increasingly reliant on cloud-based IT, the threat to data security looms larger. Employers are seeking qualified professionals with a proven cloud security skillset, and the CCSP credential brings your resume to the top of the pile. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide gives you the tools and information you need to earn that certification, and apply your skills in a real-world setting.

Computer Security (Paperback, 3rd Edition): Dieter Gollmann Computer Security (Paperback, 3rd Edition)
Dieter Gollmann
R1,209 Discovery Miles 12 090 Ships in 10 - 15 working days

A completely up-to-date resource on computer security

Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another.Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer securityExamines the foundations of computer security and its basic principlesAddresses username and password, password protection, single sign-on, and moreDiscusses operating system integrity, hardware security features, and memoryCovers Unix security, Windows security, database security, network security, web security, and software security

Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.

Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised... Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers (Hardcover, 1st ed. 2018)
Gilbert Peterson, Sujeet Shenoi
R2,523 R2,153 Discovery Miles 21 530 Save R370 (15%) Ships in 10 - 15 working days

ADVANCES IN DIGITAL FORENSICS XIV Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XIV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues; Forensic Techniques; Network Forensics; Cloud Forensics; and Mobile and Embedded Device Forensics. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of nineteen edited papers from the Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2018. Advances in Digital Forensics XIV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

On the Move to Meaningful Internet Systems: OTM 2009 - Confederated International Conferences, CoopIS, DOA, IS, and ODBASE... On the Move to Meaningful Internet Systems: OTM 2009 - Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II (Paperback, 2009 ed.)
Robert Meersman, Tharam Dillon, Pilar Herrero
R3,147 Discovery Miles 31 470 Ships in 7 - 11 working days

This two-volume set LNCS 5870/5871 constitutes the refereed proceedings of the four confederated international conferences on Cooperative Information Systems (CoopIS 2009), Distributed Objects and Applications (DOA 2009), Information Security (IS 2009), and Ontologies, Databases and Applications of Semantics (ODBASE 2009), held as OTM 2009 in Vilamoura, Portugal, in November 2009.

The 83 revised full papers presented together with 4 keynote talks were carefully reviewed and selected from a total of 234 submissions. Corresponding to the four OTM 2009 main conferences CoopIS, DOA, IS, and ODBASE the papers are organized in topical sections on workflow; process models; ontology challenges; network complexity; modeling cooperation; information complexity; infrastructure; information; aspect-oriented approaches for distributed middleware; distributed algorithms and communication protocols; distributed infrastructures for cluster and Grid computing; object-based, component-based, resource-oriented, event-oriented, and service-oriented middleware; peer-to-peer and centralized infrastructures; performance analysis of distributed computing systems; reliability, fault tolerance, quality of service, and real time support; self* properties in distributed middleware; software engineering for distributed middleware systems; security and privacy in a connected world; ubiquitous and pervasive computing; information systems security; privacy and authentication; security policies and verification; managing ontologies; using ontologies; event processing; dealing with heterogeneity; building knowledge bases; and XML and XML schema.

The Cybersecurity Dilemma - Network Intrusions, Trust and Fear in the International System (Paperback): Ben Buchanan The Cybersecurity Dilemma - Network Intrusions, Trust and Fear in the International System (Paperback)
Ben Buchanan
R645 R600 Discovery Miles 6 000 Save R45 (7%) Ships in 10 - 15 working days

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Building Machine Learning Pipelines - Automating Model Life Cycles with Tensorflow (Paperback): Hannes Hapke, Catherine Nelson Building Machine Learning Pipelines - Automating Model Life Cycles with Tensorflow (Paperback)
Hannes Hapke, Catherine Nelson
R1,375 R1,038 Discovery Miles 10 380 Save R337 (25%) Ships in 7 - 11 working days

Companies are spending billions on machine learning projects, but it's money wasted if the models can't be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You'll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. Understand the steps to build a machine learning pipeline Build your pipeline using components from TensorFlow Extended Orchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow Pipelines Work with data using TensorFlow Data Validation and TensorFlow Transform Analyze a model in detail using TensorFlow Model Analysis Examine fairness and bias in your model performance Deploy models with TensorFlow Serving or TensorFlow Lite for mobile devices Learn privacy-preserving machine learning techniques

Security and Data Storage Aspect in Cloud Computing (Hardcover, 1st ed. 2019): Prachi S. Deshpande, Subhash C. Sharma, Sateesh... Security and Data Storage Aspect in Cloud Computing (Hardcover, 1st ed. 2019)
Prachi S. Deshpande, Subhash C. Sharma, Sateesh K. Peddoju
R2,990 R2,524 Discovery Miles 25 240 Save R466 (16%) Ships in 10 - 15 working days

This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.

Advanced Computing and Systems for Security - Volume Ten (Paperback, 1st ed. 2020): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Ten (Paperback, 1st ed. 2020)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R2,244 R2,129 Discovery Miles 21 290 Save R115 (5%) Ships in 10 - 15 working days

This book features extended versions of selected papers that were presented and discussed at the 6th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2019) held in Kolkata, India on 12-13 March, 2019. Organized by the Departments of Computer Science & Engineering and A.K. Choudhury School of Information Technology, both from the University of Calcutta, the symposium's international partners were Ca' Foscari University of Venice, Italy and Bialystok University of Technology, Poland. The chapters cover topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems, reflecting the various symposium sessions.

CompTIA Security+ Guide to Network Security Fundamentals (Paperback, 6th edition): Mark Ciampa CompTIA Security+ Guide to Network Security Fundamentals (Paperback, 6th edition)
Mark Ciampa
R1,012 R883 Discovery Miles 8 830 Save R129 (13%) Ships in 15 - 25 working days

Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-501 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the sixth edition includes expanded coverage of embedded device security, attacks and defenses, and new software tools to assess security. Practical, Hands-On Projects and case activities help you put what you learn into real-world practice, while the innovative Information Security Community Site connects you to additional activities, blogs, videos, and up-to-the-minute news and insights from the information security field.

Managing the Human Factor in Information Security - How to win over staff and influence business managers (Paperback): David... Managing the Human Factor in Information Security - How to win over staff and influence business managers (Paperback)
David Lacey
R790 R569 Discovery Miles 5 690 Save R221 (28%) Ships in 10 - 15 working days

With the growth in social networking and the potential for larger and larger breaches of sensitive data, it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals

Cyber Smart - Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Paperback): Bart R. McDonough Cyber Smart - Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals (Paperback)
Bart R. McDonough
R420 R317 Discovery Miles 3 170 Save R103 (25%) Ships in 10 - 15 working days

An easy-to-read guide to protecting your digital life and your family online The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret. In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from: Identify theft Compromising your children Lost money Lost access to email and social media accounts Digital security is one of the most important, and least understood, aspects of our daily lives. But it doesn't have to be. Thanks to its clear instruction, friendly tone, and practical strategies, Cyber Smart will help you rest more easily, knowing you and your family are protected from digital attack.

Critical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March... Critical Infrastructure Protection XI - 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers (Hardcover, 1st ed. 2017)
Mason Rice, Sujeet Shenoi
R2,182 Discovery Miles 21 820 Ships in 10 - 15 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XI describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Infrastructure Protection, Infrastructure Modeling and Simulation, Industrial Control System Security, and Internet of Things Security. This book is the eleventh volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Eleventh Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2017. Critical Infrastructure Protection XI is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Cybersecurity - Executive Order 13636 & the Critical Infrastructure Framework (Paperback): Anastacia D'Ambrosio Cybersecurity - Executive Order 13636 & the Critical Infrastructure Framework (Paperback)
Anastacia D'Ambrosio
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

Cyberthreats to U.S. infrastructure and other assets are a growing concern to policymakers. Information and communications technology (ICT) is ubiquitous and relied upon for government services, corporate business processes, and individual professional and personal pursuits -- almost every facet of modern life. Many ICT devices and other components are interdependent, and disruption of one component may have a negative, cascading effect on others. A denial of service, theft or manipulation of data, or damage to critical infrastructure through a cyber-based attack could have significant impacts on national security, the economy, and the livelihood and safety of individual citizens. The federal legislative framework for cybersecurity is complex, with more than 50 statutes addressing various aspects of it either directly or indirectly. Many observers do not believe that the current framework is sufficient to address the growing concerns about the security of cyberspace in the United States. However, no major cybersecurity legislation has been enacted since 2002. This book provides an overview of the 2013 cybersecurity executive order and discusses considerations for Congress. It also provides ways to improve the critical infrastructure of cybersecurity.

Emerging Technologies in Data Mining and Information Security - Proceedings of IEMIS 2018, Volume 1 (Paperback, 1st ed. 2019):... Emerging Technologies in Data Mining and Information Security - Proceedings of IEMIS 2018, Volume 1 (Paperback, 1st ed. 2019)
Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta
R6,271 R5,185 Discovery Miles 51 850 Save R1,086 (17%) Ships in 10 - 15 working days

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23-25, 2018. It comprises high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.

Dark Mirror - Edward Snowden and the American Surveillance State (Large print, Paperback, Large type / large print edition):... Dark Mirror - Edward Snowden and the American Surveillance State (Large print, Paperback, Large type / large print edition)
Barton Gellman
R658 R523 Discovery Miles 5 230 Save R135 (21%) Ships in 7 - 11 working days
On Fire at Work - How Great Companies Ignite Passion in Their People without Burning Them (Hardcover): Eric Chester On Fire at Work - How Great Companies Ignite Passion in Their People without Burning Them (Hardcover)
Eric Chester
R395 R325 Discovery Miles 3 250 Save R70 (18%) Ships in 10 - 15 working days

On Fire at Work flies in the face of other books on workplace culture by showing that employee engagement isn t the ultimate goal it s merely the starting point. Renowned leadership expert Eric Chester has gone straight to the source top-tier leaders of the world s best places to work to uncover their best practice strategies for getting employees to work harder, perform better, and stay longer.

On Fire at Work features examples and original stories from exclusive personal interviews with over 25 founders/CEOs/presidents of companies like Marriott, Siemens, BB&T Bank, Wegmans, 7-Eleven, Hormel, Canadian WestJet, Ben & Jerry s, and The Container Store, along with smaller companies like Firehouse Subs, the Nerdery, and Build-A-Bear. The guiding principle is that any organization in any industry from Fortune 500 firms to mom-and-pop shops can learn how to bring out the very best in their employees.

The book s content-rich research and conversational case study-based narrative make it a timely, actionable go-to reference on employee performance and productivity for C-level execs, corporate and government managers, HR professionals, and small business owners.

On Fire at Work is a practical field guide that any organization can implement to build, not an engaged workforce, but a workforce that s on fire!

CASP+ Practice Tests - Exam CAS-003 (Paperback): Nadean H. Tanner CASP+ Practice Tests - Exam CAS-003 (Paperback)
Nadean H. Tanner
R811 R633 Discovery Miles 6 330 Save R178 (22%) Ships in 7 - 11 working days

Power through your CASP+ Exam CAS-003 preparation with these invaluable practice questions For those studying for the CASP+ Exam CAS-003, Nadean H. Tanner's CASP+ Practice Tests Exam CAS-003 will help you make the most of your prep time. The included two practice exams, domain-by-domain questions, and the accompanying Sybex interactive learning environment and online test bank will help you focus your efforts, gauge your progress, and improve your understanding of the necessary objectives. CASP+ Practice Tests Exam CAS-003 provides readers with practice questions that cover the five CASP+ objective domains: Risk Management Enterprise Security Architecture Enterprise Security Operations Technical Integration of Enterprise Security Research, Development, and Collaboration Specifically written for IT professionals studying for the CASP+ Exam CAS-003, this book is also a perfect refresher for anyone seeking to brush up on their IT cybersecurity knowledge. The practice exams and domain-by-domain questions combine to provide readers with over 1,000 practice questions to help validate your knowledge and optimize your preparation.

Getting an Information Security Job For Dummies (Paperback): Peter H. Gregory Getting an Information Security Job For Dummies (Paperback)
Peter H. Gregory 1
R574 R424 Discovery Miles 4 240 Save R150 (26%) Ships in 10 - 15 working days

Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense guidance on everything you need to get ahead of the competition and launch yourself into your dream job as an Information Security (IS) guru. Inside, you'll discover the fascinating history, projected future, and current applications/issues in the IS field. Next, you'll get up to speed on the general educational concepts you'll be exposed to while earning your analyst certification and the technical requirements for obtaining an IS position. Finally, learn how to set yourself up for job hunting success with trusted and supportive guidance on creating a winning resume, gaining attention with your cover letter, following up after an initial interview, and much more. * Covers the certifications needed for various jobs in the Information Security field * Offers guidance on writing an attention-getting resume * Provides access to helpful videos, along with other online bonus materials * Offers advice on branding yourself and securing your future in Information Security If you're a student, recent graduate, or professional looking to break into the field of Information Security, this hands-on, friendly guide has you covered.

Windows Security Monitoring - Scenarios and Patterns (Paperback): Andrei Miroshnikov Windows Security Monitoring - Scenarios and Patterns (Paperback)
Andrei Miroshnikov
R998 R707 Discovery Miles 7 070 Save R291 (29%) Ships in 10 - 15 working days

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you understand the operating system's event logging patterns for operations and changes performed within the system. Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components. Scenario-based instruction provides clear illustration of how these events unfold in the real world. From security monitoring and event patterns to deep technical details about the Windows auditing subsystem and components, this book provides detailed information on security events generated by the operating system for many common operations such as user account authentication, Active Directory object modifications, local security policy changes, and other activities. This book is based on the author's experience and the results of his research into Microsoft Windows security monitoring and anomaly detection. It presents the most common scenarios people should be aware of to check for any potentially suspicious activity. Learn to: Implement the Security Logging and Monitoring policy Dig into the Windows security auditing subsystem Understand the most common monitoring event patterns related to operations and changes in the Microsoft Windows operating system About the Author Andrei Miroshnikov is a former security program manager with Microsoft. He is an organizer and author for the DEFCON security conference "Forensics CTF" village and has been a speaker at Microsoft's Bluehat security conference. In addition, Andrei is an author of the "Windows 10 and Windows Server 2016 Security Auditing and Monitoring Reference" and multiple internal Microsoft security training documents. Among his many professional qualifications, he has earned the (ISC)2 CISSP and Microsoft MCSE: Security certifications.

Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover): Clement Guitton Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover)
Clement Guitton
R776 R714 Discovery Miles 7 140 Save R62 (8%) Ships in 10 - 15 working days

Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.

Advances in Multimedia Information Processing - PCM 2018 - 19th Pacific-Rim Conference on Multimedia, Hefei, China, September... Advances in Multimedia Information Processing - PCM 2018 - 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Richang Hong, Wen-Huang Cheng, Toshihiko Yamasaki, Meng Wang, Chong-Wah Ngo
R2,707 R2,196 Discovery Miles 21 960 Save R511 (19%) Ships in 10 - 15 working days

The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018. The 209 regular papers presented together with 20 special session papers were carefully reviewed and selected from 452 submissions. The papers cover topics such as: multimedia content analysis; multimedia signal processing and communications; and multimedia applications and services.

Hacker Culture and the New Rules of Innovation (Paperback): Tim Rayner Hacker Culture and the New Rules of Innovation (Paperback)
Tim Rayner
R929 Discovery Miles 9 290 Ships in 10 - 15 working days

Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.

Proceedings of International Conference on Smart Computing and Cyber Security - Strategic Foresight, Security Challenges and... Proceedings of International Conference on Smart Computing and Cyber Security - Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) (Hardcover, 1st ed. 2021)
Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar
R5,817 Discovery Miles 58 170 Ships in 7 - 11 working days

This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) held during July 7-8, 2020, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,116 Discovery Miles 11 160
(ISC)2 CISSP Certified Information…
Mike Chapple, David Seidl, … Paperback R1,903 R1,329 Discovery Miles 13 290
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
Dark Mirror - Edward Snowden and the…
Barton Gellman Hardcover R615 R490 Discovery Miles 4 900
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,650 Discovery Miles 16 500
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R902 Discovery Miles 9 020
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,671 Discovery Miles 16 710
Password Book - Logbook to keep track of…
Imaginary Planet Publishing Paperback R156 Discovery Miles 1 560
Cyberpower and National Security
Larry Wentz, Stuart H. Starr, … Paperback R679 R532 Discovery Miles 5 320

 

Partners