0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (88)
  • R500+ (2,040)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

The Economics of Blockchain and Cryptocurrency - A Transaction Costs Revolution (Hardcover): James L. Caton The Economics of Blockchain and Cryptocurrency - A Transaction Costs Revolution (Hardcover)
James L. Caton
R2,868 Discovery Miles 28 680 Ships in 12 - 17 working days

This timely book is an innovative look at how blockchain technology will transform the structure of social and economic life. The security of blockchain supports the provision and maintenance of reliable databases and the creation of rule-based governance protocols. Leading contributors expertly review the impact of blockchain on existing structures of law, monetary systems, supply chains and business organizations. Using economic and institutional theory, the book presents a vision for understanding the future development of blockchain technology and outlines the likely path of transformation that blockchain will drive in industry, supply chains and firms. Furthermore, it answers key questions such as: will Bitcoin or another cryptocurrency become the money of the future? How has blockchain already begun transforming economic activity? How can we evaluate the likely trajectory of technological development and application? This informative book is an excellent resource for academics or professionals interested in a theoretically sound perspective on blockchain. Written in an accessible prose, it provides an introduction for non-experts looking to learn more about the wide-ranging implications of blockchain and cryptocurrency.

Alice and Bob Learn Application Security (Paperback): T Janca Alice and Bob Learn Application Security (Paperback)
T Janca
R885 Discovery Miles 8 850 Ships in 12 - 17 working days

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

How to Prove It - A Structured Approach (Paperback, 3rd Revised edition): Daniel J. Velleman How to Prove It - A Structured Approach (Paperback, 3rd Revised edition)
Daniel J. Velleman
R1,096 Discovery Miles 10 960 Ships in 9 - 15 working days

Proofs play a central role in advanced mathematics and theoretical computer science, yet many students struggle the first time they take a course in which proofs play a significant role. This bestselling text's third edition helps students transition from solving problems to proving theorems by teaching them the techniques needed to read and write proofs. Featuring over 150 new exercises and a new chapter on number theory, this new edition introduces students to the world of advanced mathematics through the mastery of proofs. The book begins with the basic concepts of logic and set theory to familiarize students with the language of mathematics and how it is interpreted. These concepts are used as the basis for an analysis of techniques that can be used to build up complex proofs step by step, using detailed 'scratch work' sections to expose the machinery of proofs about numbers, sets, relations, and functions. Assuming no background beyond standard high school mathematics, this book will be useful to anyone interested in logic and proofs: computer scientists, philosophers, linguists, and, of course, mathematicians.

AI-based Metaheuristics for Information Security in Digital Media (Hardcover): Apoorva S Shastri, Mangal Singh, Anand J.... AI-based Metaheuristics for Information Security in Digital Media (Hardcover)
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
R2,325 Discovery Miles 23 250 Ships in 9 - 15 working days

AI Metaheuristics for Information Security in Digital Media examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications. Drawing on multidisciplinary research including computer vision, machine learning, artificial intelligence, modified/newly developed metaheuristics algorithms, it will enhance information security for society. It includes state-of-the-art research with illustrations and exercises throughout.

Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Paperback):... Teaching Cybersecurity - A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom (Paperback)
Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
R1,096 Discovery Miles 10 960 Ships in 9 - 15 working days

Key Features / Selling Points Unique selling point: * The only book to distill the CSEC2017 recommendations down into practical teaching approaches for K-12 classrooms Core audience: * Teachers and educators of cybersecurity, who may or may not have a background in the subject Place in the market: * First book of its kind

The Security Hippie (Paperback): Barak Engel The Security Hippie (Paperback)
Barak Engel
R1,089 Discovery Miles 10 890 Ships in 9 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition): Branden... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 5th edition)
Branden Williams, James Adamson
R1,344 Discovery Miles 13 440 Ships in 9 - 15 working days

Unique selling point: * Industry standard book for merchants, banks, and consulting firms looking to learn more about PCI DSS compliance. Core audience: * Retailers (both physical and electronic), firms who handle credit or debit cards (such as merchant banks and processors), and firms who deliver PCI DSS products and services. Place in the market: * Currently there are no PCI DSS 4.0 books

Cryptography - Theory and Practice (Paperback, 4th edition): Douglas Robert Stinson, Maura Paterson Cryptography - Theory and Practice (Paperback, 4th edition)
Douglas Robert Stinson, Maura Paterson
R1,381 Discovery Miles 13 810 Ships in 9 - 15 working days

Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography. The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world. Key Features of the Fourth Edition: New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9). New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1). New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A). An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium. Interesting attacks on cryptosystems, including: padding oracle attack correlation attacks and algebraic attacks on stream ciphers attack on the DUAL-EC random bit generator that makes use of a trapdoor. A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard. Methods of key distribution in sensor networks. The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret. The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain. The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.

A Material History of Medieval and Early Modern Ciphers - Cryptography and the History of Literacy (Hardcover): Susan Kim,... A Material History of Medieval and Early Modern Ciphers - Cryptography and the History of Literacy (Hardcover)
Susan Kim, Katherine Ellison
R4,208 Discovery Miles 42 080 Ships in 12 - 17 working days

The first cultural history of early modern cryptography, this collection brings together scholars in history, literature, music, the arts, mathematics, and computer science who study ciphering and deciphering from new materialist, media studies, cognitive studies, disability studies, and other theoretical perspectives. Essays analyze the material forms of ciphering as windows into the cultures of orality, manuscript, print, and publishing, revealing that early modern ciphering, and the complex history that preceded it in the medieval period, not only influenced political and military history but also played a central role in the emergence of the capitalist media state in the West, in religious reformation, and in the scientific revolution. Ciphered communication, whether in etched stone and bone, in musical notae, runic symbols, polyalphabetic substitution, algebraic equations, graphic typographies, or literary metaphors, took place in contested social spaces and offered a means of expression during times of political, economic, and personal upheaval. Ciphering shaped the early history of linguistics as a discipline, and it bridged theological and scientific rhetoric before and during the Reformation. Ciphering was an occult art, a mathematic language, and an aesthetic that influenced music, sculpture, painting, drama, poetry, and the early novel. This collection addresses gaps in cryptographic history, but more significantly, through cultural analyses of the rhetorical situations of ciphering and actual solved and unsolved medieval and early modern ciphers, it traces the influences of cryptographic writing and reading on literacy broadly defined as well as the cultures that generate, resist, and require that literacy. This volume offers a significant contribution to the history of the book, highlighting the broader cultural significance of textual materialities.

Computational Techniques for Text Summarization based on Cognitive Intelligence (Hardcover): K.Uma Maheswari, V. Priya Computational Techniques for Text Summarization based on Cognitive Intelligence (Hardcover)
K.Uma Maheswari, V. Priya
R2,644 Discovery Miles 26 440 Ships in 9 - 15 working days

The book is concerned with contemporary methodologies used for automatic text summarization. It proposes interesting approaches to solve well-known problems on text-summarization using computational intelligence (CI) techniques including cognitive approaches. A better understanding of the cognitive basis of the summarization task is still an open research issue, an extent of its use in text summarization is highlighted for further exploration. With the ever-growing text and people on research has little time to spare for extensive reading, where, summarized information helps for a better understanding of the context at a shorter time. This book helps students and researchers to automatically summarize the text documents in an efficient and effective way. The computational approaches and the research techniques presented guides to achieve text summarization at ease. The summarized text generated supports readers to learn the context or the domain at a quicker pace. The book is presented with reasonable amount of illustrations and examples convenient for the readers to understand and implement for their use. The book is not to make readers understand what text summarization is, but for people to perform text summarization using various approaches. This also describes measures that can help to evaluate, determine and explore the best possibilities for text summarization to analyse and use for any specific purpose. The illustration is based on social media and healthcare domain, which shows the possibilities to work with any domain for summarization. The new approach for text summarization based on cognitive intelligence is presented for further exploration in the field.

Enigma: How Breaking the Code Helped Win World War II (Hardcover): Michael Kerrigan Enigma: How Breaking the Code Helped Win World War II (Hardcover)
Michael Kerrigan
R645 R492 Discovery Miles 4 920 Save R153 (24%) Ships in 12 - 17 working days

At its peak in January 1945, 10,000 people worked at Bletchley Park, reading 4000 messages a day, decrypting German and Japanese communications and helping the Allies to victory. But while we know that Bletchley was the centre of Britain's World War II code-breaking, how did its efforts actually change the course of the war? Enigma: How Breaking the Code Helped Win World War II tells the story of Bletchley's role in defeating U-boats in the Atlantic, breaking the Japanese codes, helping the Allies to victory in North Africa, deciphering the German military intelligence code, learning of most German positions in western Europe before the Normandy Landings, defeating the Italian Navy in the Mediterranean, and helping sink the German battleship Scharnhorst off Norway. In tracing these events, the book also delves into the stories of major Bletchley characters, 'boffins' such as Alan Turing and Gordon Welchman, and 'Debs' such as Joan Clarke and Margaret Rock. An accessible work of military history that ranges across air, land and naval warfare, the book also touches on the story of early computer science. Illustrated with 120 black-&-white and colour photographs, artworks and maps, Enigma: How Breaking the Code Helped Win World War II is an authoritative and novel perspective on WWII history.

Data Fitting and Uncertainty - A practical introduction to weighted least squares and beyond (Paperback, 2nd revised and... Data Fitting and Uncertainty - A practical introduction to weighted least squares and beyond (Paperback, 2nd revised and extended ed. 2016)
Tilo Strutz
R3,697 Discovery Miles 36 970 Ships in 12 - 17 working days

The subject of data fitting bridges many disciplines, especially those traditionally dealing with statistics like physics, mathematics, engineering, biology, economy, or psychology, but also more recent fields like computer vision. This book addresses itself to engineers and computer scientists or corresponding undergraduates who are interested in data fitting by the method of least-squares approximation, but have no or only limited pre-knowledge in this field. Experienced readers will find in it new ideas or might appreciate the book as a useful work of reference. Familiarity with basic linear algebra is helpful though not essential as the book includes a self-contained introduction and presents the method in a logical and accessible fashion. The primary goal of the text is to explain how data fitting via least squares works. The reader will find that the emphasis of the book is on practical matters, not on theoretical problems. In addition, the book enables the reader to design own software implementations with application-specific model functions based on the comprehensive discussion of several examples. The text is accompanied with working source code in ANSI-C for fitting with weighted least squares including outlier detection. Among others the book covers following topics * fitting of linear and nonlinear functions with one- or multi-dimensional variables * weighted least-squares * outlier detection * evaluation of the fitting results * different optimisation strategies * combined fitting of different model functions * total least-squares approach with multi-dimensional conditions

Introduction to Coding Theory (Paperback, 2nd edition): Jurgen Bierbrauer Introduction to Coding Theory (Paperback, 2nd edition)
Jurgen Bierbrauer
R1,373 Discovery Miles 13 730 Ships in 9 - 15 working days

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes, and algebraic curves. The latter part presents a brief introduction to the theory of algebraic curves and its most important applications to coding theory.

Tribe of Hackers Security Leaders - Tribal Knowledge from the best in Cybersecurity Leadership (Paperback): M. J. Carey Tribe of Hackers Security Leaders - Tribal Knowledge from the best in Cybersecurity Leadership (Paperback)
M. J. Carey
R448 Discovery Miles 4 480 Ships in 12 - 17 working days

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.

Algorithmic Number Theory - 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010, Proceedings (Paperback, 2010... Algorithmic Number Theory - 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010, Proceedings (Paperback, 2010 ed.)
Guillaume Hanrot, Francois Morain, Emmanuel Thome
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

ANTS-IX was the ninth edition of the biennial International Symposium on Algorithmic Number Theory. The ?rst edition of this symposium was held at Cornell University in 1994. ANTS-IX was held July 19-23, 2010 at INRIA in Nancy, France. The ANTS-IX Program Committee consisted of 12 members whose names are listed on the next page. The selection of the accepted papers among the submissions was made from mid-January to end of March 2010. Each paper was thoroughly reviewed by at least two experts, including a Program Committee member. The Program Committee selected 25 high-quality articles, which are excellent representatives of the current state of the art in various areas of - gorithmic number theory. The Selfridge Prize in computational number theory was awarded to the authors of the best contributed paper presented at the c- ference. We gratefully thank the authors of all submitted papers for their hard work which made the selection of a varied program possible. We also thank the authors of the accepted papers for their cooperation in the timely production of the revised versions. Each submitted paper was presented by one of its co-authors at the c- ference. Besides contributed papers, the conference included ?ve invited talks by Henri Darmon (McGill University), Jean-Fran, cois Mestre (Universit'eParis 7), Gabriele Nebe (RWTH Aachen), Carl Pomerance (Dartmouth College), and Oded Regev (Tel-Aviv University).

Advanced Cybersecurity Technologies (Paperback): Ralph Moseley Advanced Cybersecurity Technologies (Paperback)
Ralph Moseley
R1,501 Discovery Miles 15 010 Ships in 9 - 15 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

The Code Book - The Secret History of Codes and Code-Breaking (Paperback, Reissue): Simon Singh The Code Book - The Secret History of Codes and Code-Breaking (Paperback, Reissue)
Simon Singh 3
R339 R253 Discovery Miles 2 530 Save R86 (25%) Ships in 12 - 17 working days

Since humans began writing, they have been communicating in code. This obsession with secrecy has had dramatic effects on the outcome of wars, monarchies and individual lives.

With clear mathematical, linguistic and technological demonstrations of many of the codes, as well as illustrations of some of the remarkable personalities behind them – many courageous, some villainous – The Code Book traces the fascinating development of codes and code-breaking from military espionage in Ancient Greece to modern computer ciphers, to reveal how the remarkable science of cryptography has often changed the course of history.

Amongst many extraordinary examples, Simon Singh relates in detail the story of Mary, Queen of Scots, trapped by her own code and put to death by Elizabeth I; the strange history of the Beale Ciphers, describing the hidden location of a fortune in gold, buried somewhere in Virginia in the nineteenth century and still not found; and the monumental efforts in code-making and code-breaking that influenced the outcomes of the First and Second World Wars.

Now, with the Information Age bringing the possibility of a truly unbreakable code ever nearer, and cryptography one of the major debates of our times, Singh investigates the challenge that technology has brought to personal privacy today.

Dramatic, compelling and remarkably far-reaching, The Code Book will forever alter your view of history, what drives it and how private your last e-mail really was.

Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings... Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings (Paperback, 2010 ed.)
Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao
R1,532 Discovery Miles 15 320 Ships in 10 - 15 working days

Advanced Science and Technology, Advanced Communication and Networking, Information Security and Assurance, Ubiquitous Computing and Multimedia Appli- tions are conferences that attract many academic and industry professionals. The goal of these co-located conferences is to bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of advanced science and technology, advanced communication and networking, information security and assurance, ubiquitous computing and m- timedia applications. This co-located event included the following conferences: AST 2010 (The second International Conference on Advanced Science and Technology), ACN 2010 (The second International Conference on Advanced Communication and Networking), ISA 2010 (The 4th International Conference on Information Security and Assurance) and UCMA 2010 (The 2010 International Conference on Ubiquitous Computing and Multimedia Applications). We would like to express our gratitude to all of the authors of submitted papers and to all attendees, for their contributions and participation. We believe in the need for continuing this undertaking in the future. We acknowledge the great effort of all the Chairs and the members of advisory boards and Program Committees of the above-listed events, who selected 15% of over 1,000 submissions, following a rigorous peer-review process. Special thanks go to SERSC (Science & Engineering Research Support soCiety) for supporting these - located conferences.

An Introduction to Number Theory with Cryptography (Paperback, 2nd edition): James Kraft, Lawrence Washington An Introduction to Number Theory with Cryptography (Paperback, 2nd edition)
James Kraft, Lawrence Washington
R1,382 Discovery Miles 13 820 Ships in 9 - 15 working days

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style to reflect number theory's increasing popularity. The book is designed to be used by sophomore, junior, and senior undergraduates, but it is also accessible to advanced high school students and is appropriate for independent study. It includes a few more advanced topics for students who wish to explore beyond the traditional curriculum. Features of the second edition include Over 800 exercises, projects, and computer explorations Increased coverage of cryptography, including Vigenere, Stream, Transposition,and Block ciphers, along with RSA and discrete log-based systems "Check Your Understanding" questions for instant feedback to students New Appendices on "What is a proof?" and on Matrices Select basic (pre-RSA) cryptography now placed in an earlier chapter so that the topic can be covered right after the basic material on congruences Answers and hints for odd-numbered problems About the Authors: Jim Kraft received his Ph.D. from the University of Maryland in 1987 and has published several research papers in algebraic number theory. His previous teaching positions include the University of Rochester, St. Mary's College of California, and Ithaca College, and he has also worked in communications security. Dr. Kraft currently teaches mathematics at the Gilman School. Larry Washington received his Ph.D. from Princeton University in 1974 and has published extensively in number theory, including books on cryptography (with Wade Trappe), cyclotomic fields, and elliptic curves. Dr. Washington is currently Professor of Mathematics and Distinguished Scholar-Teacher at the University of Maryland.

Hacking Connected Cars - Tactics, Techniques, and Procedures (Paperback): A. Knight Hacking Connected Cars - Tactics, Techniques, and Procedures (Paperback)
A. Knight
R877 Discovery Miles 8 770 Ships in 12 - 17 working days

A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.

Global Security, Safety, and Sustainability - 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010.... Global Security, Safety, and Sustainability - 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings (Paperback, Edition.)
Sergio Tenreiro De Magalhaes, Hamid Jahankhani, Ali G. Hessami
R1,526 Discovery Miles 15 260 Ships in 10 - 15 working days

The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between acad- ics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The three-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. The importance of adopting systematic and systemic - proaches to the assurance of these systems was emphasized within a special stream focused on strategic frameworks, architectures and human factors. The conference provided an opportunity for systems scientists, assurance researchers, owners, ope- tors and maintainers of large, complex and advanced systems and infrastructures to update their knowledge on the state of best practice in these challenging domains while networking with the leading researchers and solution providers. ICGS3 2010 received paper submissions from more than 17 different countries in all continents. Only 31 papers were selected and were presented as full papers. The program also included a number of keynote lectures by leading researchers, security professionals and government representatives.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,160 Discovery Miles 11 600 Ships in 9 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Tribe of Hackers Blue Team - Tribal Knowledge from  the best in Defensive Cybersecurity (Paperback): M. J. Carey Tribe of Hackers Blue Team - Tribal Knowledge from the best in Defensive Cybersecurity (Paperback)
M. J. Carey
R456 Discovery Miles 4 560 Ships in 12 - 17 working days

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

e-Business and Telecommunications - 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised... e-Business and Telecommunications - 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers (Paperback, Edition.)
Mohammad S. Obaidat, Joaquim Filipe
R1,545 Discovery Miles 15 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Joint Conference on e-Business and Telecommunications, ICETE 2009, held in Milan, Italy, in July 2009. The 34 revised full papers presented together with 4 invited papers in this volume were carefully reviewed and selected from 300 submissions. They have passed two rounds of selection and improvement. The papers are organized in topical sections on e-business; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.

Blockchain for Industry 4.0 - Blockchain for Industry 4.0: Emergence, Challenges, and Opportunities (Hardcover): Asharaf S,... Blockchain for Industry 4.0 - Blockchain for Industry 4.0: Emergence, Challenges, and Opportunities (Hardcover)
Asharaf S, Justin Goldston, Samson Williams, Anoop V.S.
R3,569 Discovery Miles 35 690 Ships in 9 - 15 working days

This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain. It explains Blockchain concepts related to Industry 4.0, Smart Healthcare, and the Internet of Things (IoT) and explores Smart Contracts and Consensus algorithms. This book will serve as an ideal reference text for graduate students and academic researchers in electrical engineering, electronics and communication engineering, computer engineering, and information technology. This book * Discusses applications of blockchain technology in diverse sectors such as industry 4.0, education, finance, and supply chain. * Provides theoretical concepts, applications, and research advancements in the field of blockchain. * Covers industry 4.0 digitization platform and blockchain for data management in industry 4.0 in a comprehensive manner. * Emphasizes analysis and design of consensus algorithms, fault tolerance, and strategy to choose the correct consensus algorithm. * Introduces security issues in the industrial internet of things, internet of things, blockchain integration, and blockchain-based applications. The text presents in-depth coverage of theoretical concepts, applications and advances in the field of blockchain technology. This book will be an ideal reference for graduate students and academic researchers in diverse engineering fields such as electrical, electronics and communication, computer, and information technology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
An Introduction to Symbolic Dynamics and…
Douglas Lind, Brian Marcus Paperback R1,489 R1,405 Discovery Miles 14 050
Understanding Blockchain and…
Akira Summers Paperback R1,505 Discovery Miles 15 050
Codebreaker in the Far East
Alan Stripp Paperback R786 Discovery Miles 7 860
Exercises in Programming Style
Cristina Videira Lopes Paperback R1,148 Discovery Miles 11 480
Allied and Axis Signals Intelligence in…
David Alvarez Paperback R1,854 Discovery Miles 18 540
Allied and Axis Signals Intelligence in…
David Alvarez Hardcover R4,359 Discovery Miles 43 590
Teaching Cybersecurity - A Handbook for…
Daniel Shoemaker, Ken Sigler, … Hardcover R3,022 Discovery Miles 30 220
Heterogeneous Cyber Physical Systems of…
Ioannis Papaefstathiou, Alkis Hatzopoulos Hardcover R2,842 Discovery Miles 28 420
Cryptoeconomics - Igniting a New Era of…
Jian Gong, Wei Xu Paperback R1,348 Discovery Miles 13 480
Concise Encyclopedia of Coding Theory
W. Cary Huffman, Jon-Lark Kim, … Hardcover R6,110 Discovery Miles 61 100

 

Partners