0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (319)
  • R250 - R500 (925)
  • R500+ (16,307)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Machine Learning Forensics for Law Enforcement, Security, and Intelligence (Hardcover, New): Jesus Mena Machine Learning Forensics for Law Enforcement, Security, and Intelligence (Hardcover, New)
Jesus Mena
R3,714 Discovery Miles 37 140 Ships in 12 - 17 working days

Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data. To combat this unlawful activity, knowledge about the use of machine learning technology and software is critical. Machine Learning Forensics for Law Enforcement, Security, and Intelligence integrates an assortment of deductive and instructive tools, techniques, and technologies to arm professionals with the tools they need to be prepared and stay ahead of the game.

Step-by-step instructions

The book is a practical guide on how to conduct forensic investigations using self-organizing clustering map (SOM) neural networks, text extraction, and rule generating software to "interrogate the evidence." This powerful data is indispensable for fraud detection, cybersecurity, competitive counterintelligence, and corporate and litigation investigations. The book also provides step-by-step instructions on how to construct adaptive criminal and fraud detection systems for organizations.

Prediction is the key

Internet activity, email, and wireless communications can be captured, modeled, and deployed in order to anticipate potential cyber attacks and other types of crimes. The successful prediction of human reactions and server actions by quantifying their behaviors is invaluable for pre-empting criminal activity. This volume assists chief information officers, law enforcement personnel, legal and IT professionals, investigators, and competitive intelligence analysts in the strategic planning needed to recognize the patterns of criminal activities in order to predict when and where crimes and intrusions are likely to take place.

Game Theory for Wireless Communications and Networking (Hardcover): Yan Zhang, Mohsen Guizani Game Theory for Wireless Communications and Networking (Hardcover)
Yan Zhang, Mohsen Guizani
R4,047 Discovery Miles 40 470 Ships in 12 - 17 working days

Used to explain complicated economic behavior for decades, game theory is quickly becoming a tool of choice for those serious about optimizing next generation wireless systems. Illustrating how game theory can effectively address a wide range of issues that until now remained unresolved, Game Theory for Wireless Communications and Networking provides a systematic introduction to the application of this powerful and dynamic tool. This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applications. It describes how to employ game theory in infrastructure-based wireless networks and multihop networks to reduce power consumption-while improving system capacity, decreasing packet loss, and enhancing network resilience. Providing for complete cross-referencing, the text is organized into four parts: Fundamentals-introduces the fundamental issues and solutions in applying different games in different wireless domains, including wireless sensor networks, vehicular networks, and OFDM-based wireless systems Power Control Games-considers issues and solutions in power control games Economic Approaches-reviews applications of different economic approaches, including bargaining and auction-based approaches Resource Management-explores how to use the game theoretic approach to address radio resource management issues The book explains how to apply the game theoretic model to address specific issues, including resource allocation, congestion control, attacks, routing, energy management, packet forwarding, and MAC. Facilitating quick and easy reference to related optimization and algorithm methodologies, it supplies you with the background and tools required to use game theory to drive the improvement and development

Architecture for the Commons - Participatory Systems in the Age of Platforms (Hardcover): Jose Sanchez Architecture for the Commons - Participatory Systems in the Age of Platforms (Hardcover)
Jose Sanchez
R4,131 Discovery Miles 41 310 Ships in 12 - 17 working days

Architecture for the Commons dives into an analysis of how the tectonics of a building is fundamentally linked to the economic organizations that allow them to exist. By tracing the origins and promises of current technological practices in design, the book provides an alternative path, one that reconsiders the means of achieving complexity through combinatorial strategies. This move requires reconsidering serial production with crowdsourcing and user content in mind. The ideas presented will be explored through the design research developed within Plethora Project, a design practice that explores the use of video game interfaces as a mechanism for participation and user design. The research work presented throughout the book seeks to align with a larger project that is currently taking place in many different fields: The Construction of the Commons. By developing both the ideological and physical infrastructure, the project of the Commons has become an antidote to current economic practices that perpetuate inequality. The mechanisms of the production and governance of the Commons are discussed, inviting the reader to get involved and participate in the discussion. The current political and economic landscape calls for a reformulation of our current economic practices and alternative value systems that challenge the current market monopolies. This book will be of great interest not only to architects and designers studying the impact of digital technologies in the field of design but also to researchers studying novel techniques for social participation and cooperating of communities through digital networks. The book connects principles of architecture, economics and social sciences to provide alternatives to the current production trends.

Dynamic Games for Network Security (Paperback, 1st ed. 2018): Xiaofan He, Huaiyu Dai Dynamic Games for Network Security (Paperback, 1st ed. 2018)
Xiaofan He, Huaiyu Dai
R1,579 R1,422 Discovery Miles 14 220 Save R157 (10%) Ships in 12 - 17 working days

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3-5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender's benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.

MOOC Learning Platform Development (Hardcover): Varun Gupta, Durg Singh Chauhan, Thomas Hanne MOOC Learning Platform Development (Hardcover)
Varun Gupta, Durg Singh Chauhan, Thomas Hanne
R1,660 Discovery Miles 16 600 Ships in 12 - 17 working days

The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses. The book proposes a flexible online platform. This solution provides flexibility in distance learning processes including course enrollment, learning, evaluation, and outcome of degrees. The proposed system not only gives students freedom to choose their courses in accordance with their needs but also use earned credit towards online degrees of any university of their choice.

Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Paperback):... Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Paperback)
Titus De Silva
R2,281 Discovery Miles 22 810 Ships in 12 - 17 working days

Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4) Shelving Guide: Business & Management The backbone of any organisation is its management system. It must reflect the needs of the organisation and the requirements of its customers. Compliance with legal requirements and ethical environmental practices contributes towards the sustainability of the management system. Whatever the state of maturity of the management, this book, one of three, provides useful guidance to design, implement, maintain and improve its effectiveness and is intended to provide readers with practical "how to" methods for integrating quality, safety and environmental management processes. This volume sets out procedures and flowcharts to show how the integration of these processes can be achieved. Separated into management procedures, core procedures, support procedures and assurance procedures and complemented by practical examples, this book is an invaluable resource for complete systems development and integration. This book, along with its two companion volumes, is a practical guide for real managers, designed to help them manage their business more effectively and gain competitive advantage. Titus De Silva is a consultant in management skills development, pharmacy practice, quality management and food safety and an advisor to the newly established National Medicines Regulatory Authority (NMRA) in Sri Lanka.

Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Hardcover):... Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Hardcover)
Titus De Silva
R4,219 Discovery Miles 42 190 Ships in 12 - 17 working days

Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4) Shelving Guide: Business & Management The backbone of any organisation is its management system. It must reflect the needs of the organisation and the requirements of its customers. Compliance with legal requirements and ethical environmental practices contributes towards the sustainability of the management system. Whatever the state of maturity of the management, this book, one of three, provides useful guidance to design, implement, maintain and improve its effectiveness and is intended to provide readers with practical "how to" methods for integrating quality, safety and environmental management processes. This volume sets out procedures and flowcharts to show how the integration of these processes can be achieved. Separated into management procedures, core procedures, support procedures and assurance procedures and complemented by practical examples, this book is an invaluable resource for complete systems development and integration. This book, along with its two companion volumes, is a practical guide for real managers, designed to help them manage their business more effectively and gain competitive advantage. Titus De Silva is a consultant in management skills development, pharmacy practice, quality management and food safety and an advisor to the newly established National Medicines Regulatory Authority (NMRA) in Sri Lanka.

Information Technology Control and Audit, Fifth Edition (Paperback, 5th edition): Angel R. Otero Information Technology Control and Audit, Fifth Edition (Paperback, 5th edition)
Angel R. Otero
R1,422 Discovery Miles 14 220 Ships in 12 - 17 working days

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.

Data Mining and Machine Learning in Cybersecurity (Hardcover): Sumeet Dua, Xian Du Data Mining and Machine Learning in Cybersecurity (Hardcover)
Sumeet Dua, Xian Du
R2,643 Discovery Miles 26 430 Ships in 12 - 17 working days

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need. From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges-detailing cutting-edge machine learning and data mining techniques. It also: Unveils cutting-edge techniques for detecting new attacks Contains in-depth discussions of machine learning solutions to detection problems Categorizes methods for detecting, scanning, and profiling intrusions and anomalies Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions Details privacy-preserving data mining methods This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

Testing Code Security (Paperback): Maura A. van der Linden Testing Code Security (Paperback)
Maura A. van der Linden
R1,814 Discovery Miles 18 140 Ships in 12 - 17 working days

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.

Security Patch Management (Hardcover): Felicia Nicastro Security Patch Management (Hardcover)
Felicia Nicastro
R2,657 Discovery Miles 26 570 Ships in 12 - 17 working days

Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that's often left to the last minute or resolved with products that automate the task. Effective patch management is not about technology; it's about having a formal process in place that can deploy patches to vulnerable systems quickly. Helping you figure out exactly what to patch and which patches to use, Security Patch Management provides detailed guidance through the process of creating and implementing an effective and efficient patch management process. It uses a format that is easy-to-understand and applicable regardless of the operating system, network device, or patch deployment tool. The author illustrates the proper implementation of patches on devices and systems within various infrastructures to provide the insight required to: Design your own patch release process and keep it action ready Test the effectiveness of your patches Keep up with the latest patch releases Prioritize the vulnerabilities that need to be addressed Apply patches quickly and without draining essential network resources This book supplies the tools and guidelines you need to stay one step ahead of the exploits on the horizon. It will help you establish a patch management process that not only protects your organization against zero-day attacks, but also helps you become more proactive when it comes to this critical facet of information security.

Data Center Storage - Cost-Effective Strategies, Implementation, and Management (Hardcover): Hubbert Smith Data Center Storage - Cost-Effective Strategies, Implementation, and Management (Hardcover)
Hubbert Smith
R3,716 Discovery Miles 37 160 Ships in 12 - 17 working days

We overspend on data center storage . yet, we fall short of business requirements. It's not about the technologies. It's about the proper application of technologies to deliver storage services efficiently and affordably. It's about meeting business requirements dependent on data center storage. Spend less, deliver more. Data Center Storage: Cost-Effective Strategies, Implementation, and Management provides an industry insider's insight on how to properly scope, plan, evaluate, and implement storage technologies to maximize performance, capacity, reliability, and power savings. It provides business and use-case focused coverage of storage technology, including storage area networks (SAN), capacity-optimized drives, and solid-state drives. It offers key insights on financially responsible spending for data center storage. Delivered in accessible language, the book starts with a discussion of the business merits of replacing direct attached, compartmentalized storage with consolidated SAN-attached storage. The author advises on the use of service level applications (SLAs) as a tool to drive business unit collaboration with IT and prioritize those actions that impact productivity and profit from those that are less critical. This business guide to applied technologies disassembles big problems into digestible segments to help you understand, quantify, and fix any problems that arise as you work towards meeting your growing storage needs. The book builds on the consolidation and SLA driven approach to take advantage of the compelling benefits and potential savings of managed hosting and cloud storage.

VCA-DCV - VMware Certified Associate-Data Center Virtualization on vSphere Study Guide - VCAD-510 (Paperback): R. Schmidt VCA-DCV - VMware Certified Associate-Data Center Virtualization on vSphere Study Guide - VCAD-510 (Paperback)
R. Schmidt
R932 R725 Discovery Miles 7 250 Save R207 (22%) Ships in 12 - 17 working days

Use this expert guide to prepare for the VCA-DCV exam

"VCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510" is a comprehensive study guide for the VMware Certified Associate - Data Center Virtualization exam. Hands-on examples, real-world scenarios, and expert review questions cover the full exam blueprint, and the companion website offers a suite of tools to help you prepare for the exam including practice exams, electronic flashcards, and a glossary of key terms. In addition, the website includes videos that demonstrate how to complete the more challenging tasks. Focused on practical skills, this study guide not only prepares you for the certification exam, but also for the duties expected of a VCA.

The VMware Certified Associate-Data Center Virtualization certification targets those with limited virtualization and VMware data center technology experience, providing a springboard to the popular VMware Certified Professional-Data Center Virtualization certification. Virtualization has become a high priority among organizations, and credentialed professionals are in high demand. This guide helps you prove a certain level of foundational skill in basic virtualization technology, including the vSphere suite's Infrastructure Services, Application Services, and vCenter Server. Topics include: Explaining data center virtualization conceptsIdentifying the core components of vSphereNetworking and storage planning/configuration with vSphereCorrelating VMware solutions to common business challenges

The VCA-DCV certification is the only one with no instructor-led training requirement, so a thorough study guide is an invaluable tool in you exam preparation. This book not only covers the full exam, but also provides practice designed to actually improve the skills used every day on the job. "VCA-DCV VMware Certified Associate on vSphere Study Guide" is more than just test prep--it's job prep.

Social Geography (Routledge Revivals) - Progress and Prospect (Hardcover): Michael Pacione Social Geography (Routledge Revivals) - Progress and Prospect (Hardcover)
Michael Pacione
R4,024 R3,565 Discovery Miles 35 650 Save R459 (11%) Ships in 12 - 17 working days

The examination of social questions is a relatively new development in goegraphy, but social geography has now blossomed into a fully fledged sub-discipline which has in fact influenced significantly all other areas of geography. This book, first published in 1987, presents an overview of recent developments in all the major branches of social geography. As such it provides a valuable introduction to te subject, a review of the latest state of the art and a pointer to future research directions.

Introduction to Computer Security - Pearson New International Edition (Paperback, Pearson New International Edition): Michael... Introduction to Computer Security - Pearson New International Edition (Paperback, Pearson New International Edition)
Michael Goodrich, Roberto Tamassia
R2,387 Discovery Miles 23 870 Ships in 9 - 15 working days

For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with "just-enough" background in computer science. The result is a presentation of the material that is accessible to students of all levels.

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition):... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition)
Douglas Landoll
R1,889 Discovery Miles 18 890 Ships in 9 - 15 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

Internet Linguistics - A Student Guide (Hardcover): David Crystal Internet Linguistics - A Student Guide (Hardcover)
David Crystal
R3,242 Discovery Miles 32 420 Ships in 12 - 17 working days

The Internet is now an integral part of contemporary life, and linguists are increasingly studying its influence on language. In this student-friendly guidebook, leading language authority Professor David Crystal follows on from his landmark bestseller Language and the Internet and presents the area as a new field: Internet linguistics. In his engaging trademark style, Crystal addresses the online linguistic issues that affect us on a daily basis, incorporating real-life examples drawn from his own studies and personal involvement with Internet companies. He provides new linguistic analyses of Twitter, Internet security, and online advertising, explores the evolving multilingual character of the Internet, and offers illuminating observations about a wide range of online behaviour, from spam to exclamation marks. Including many activities and suggestions for further research, this is the essential introduction to a critical new field for students of all levels of English language, linguistics and new media.

The ABCs of LDAP - How to Install, Run, and Administer LDAP Services (Hardcover): Reinhard E Voglmaier The ABCs of LDAP - How to Install, Run, and Administer LDAP Services (Hardcover)
Reinhard E Voglmaier
R4,623 Discovery Miles 46 230 Ships in 12 - 17 working days

This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information available on the Internet along with a number of arguments treated in the various books that are available, and provides many examples of LDAP code.

Cyber Arms - Security in Cyberspace (Hardcover): Stanislav Abaimov, Maurizio Martellini Cyber Arms - Security in Cyberspace (Hardcover)
Stanislav Abaimov, Maurizio Martellini
R5,040 Discovery Miles 50 400 Ships in 12 - 17 working days

This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure. The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives.

Handbook of SCADA/Control Systems Security (Paperback, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Paperback, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R1,319 Discovery Miles 13 190 Ships in 12 - 17 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

Honeypots - A New Paradigm to Information Security (Hardcover): R.C. Joshi, Anjali Sardana Honeypots - A New Paradigm to Information Security (Hardcover)
R.C. Joshi, Anjali Sardana
R5,346 Discovery Miles 53 460 Ships in 12 - 17 working days

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

Security and Policy Driven Computing (Hardcover, New): Lei Liu Security and Policy Driven Computing (Hardcover, New)
Lei Liu
R4,603 Discovery Miles 46 030 Ships in 12 - 17 working days

Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention. An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

Mobile Web 2.0 - Developing and Delivering Services to Mobile Devices (Hardcover): Syed A. Ahson, Mohammad Ilyas Mobile Web 2.0 - Developing and Delivering Services to Mobile Devices (Hardcover)
Syed A. Ahson, Mohammad Ilyas
R4,052 Discovery Miles 40 520 Ships in 12 - 17 working days

From basic concepts to research grade material, Mobile Web 2.0: Developing and Delivering Services to Mobile Devices provides complete and up-to-date coverage of the range of technical topics related to Mobile Web 2.0. It brings together the work of 51 pioneering experts from around the world who identify the major challenges in Mobile Web 2.0 applications and provide authoritative insight into many of their own innovations and advances in the field.

To help you address contemporary challenges, the text details a conceptual framework that provides modeling facilities for context-aware, multi-channel Web applications. It compares various platforms for developing mobile services?from the developer and user perspectives?and explains how to use high-level modeling constructs to drive the application development process through automatic code generation.

  • Proposes an expanded model of mobile application context
  • Explores mobile social software as an Information and Communications Technology (ICT)
  • Discusses the effect of context on mobile usability

Through empirical study, the book tests a number of hypotheses on the use of software implementation technology and location context in mobile applications. It introduces Reusable End-User Customization (REUC)?a technique that allows users to adapt the layout of Web pages and automatically reapplies those preferences on subsequent visits. It also investigates the need for non-visual feedback with long system response times, particularly when downloading Web pages to mobile devices.

Socio-Technical Networks - Science and Engineering Design (Hardcover): Fei Hu, Ali Mostashari, Jiang Xie Socio-Technical Networks - Science and Engineering Design (Hardcover)
Fei Hu, Ali Mostashari, Jiang Xie
R4,022 Discovery Miles 40 220 Ships in 12 - 17 working days

While there are sporadic journal articles on socio-technical networks, there's long been a need for an integrated resource that addresses concrete socio-technical network (STN) design issues from algorithmic and engineering perspectives. Filling this need, Socio-Technical Networks: Science and Engineering Design provides a complete introduction to the fundamentals of one of the hottest research areas across the social sciences, networking, and computer science -- including its definition, historical background, and models. Covering basic STN architecture from a physical/technological perspective, the book considers the system design process in a typical STN, including inputs, processes/actions, and outputs/products. It covers current applications, including transportation networks, energy systems, tele-healthcare, financial networks, and the World Wide Web. A group of STN expert contributors addresses privacy and security topics in the interdependent context of critical infrastructure, which include risk models, trust models, and privacy preserving schemes. * Covers the physical and technological designs in a typical STN * Considers STN applications in popular fields, such as healthcare and the virtual community * Details a method for mapping and measuring complexity, uncertainty, and interactions among STN components The book examines the most important STN models, including graph theory, inferring agent dynamics, decision theory, and information mining. It also explains structural studies, behavioral studies, and agent/actor system studies and policy studies in different STN contexts. Complete with in-depth case studies, this book supplies the practical insight needed to address contemporary STN design issues.

Secure Data Provenance and Inference Control with Semantic Web (Paperback): Bhavani Thuraisingham, Tyrone Cadenhead, Murat... Secure Data Provenance and Inference Control with Semantic Web (Paperback)
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
R1,836 Discovery Miles 18 360 Ships in 12 - 17 working days

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity and Third-Party Risk
GC Rasner Paperback R773 Discovery Miles 7 730
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Privacy and Legal Issues in Cloud…
Anne S.Y. Cheung, Rolf H. Weber Paperback R1,383 Discovery Miles 13 830
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,243 Discovery Miles 12 430
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,347 Discovery Miles 13 470
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,124 R907 Discovery Miles 9 070

 

Partners