0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,636)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Groupware and the World Wide Web (Hardcover, Reprinted from COMPUTER SUPPORTED COOPERATIVE WORK, 6, 1997): Richard Bentley, Uwe... Groupware and the World Wide Web (Hardcover, Reprinted from COMPUTER SUPPORTED COOPERATIVE WORK, 6, 1997)
Richard Bentley, Uwe Busbach, David Kerr, Klaas Sikkel
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The advent of the World Wide Web has changed the perspectives of groupware systems. The interest and deployment of Internet and intranet groupware solutions is growing rapidly, not just in academic circles but also in the commercial arena. The first generation of Web-based groupware tools has already started to emerge, and leading groupware vendors are urgently adapting their products for compatibility and integration with Web technologies. The focus of Groupware and the World Wide Web is to explore the potential for Web-based groupware. This book includes an analysis of the key characteristics of the Web, presenting reasons for its success, and describes developments of a diverse range of Web-based groupware systems. An emphasis on the technical obstacles and challenges is implemented by more analytical discussions and perspectives, including that of Information Technology managers looking to deploy groupware solutions within their organizations. Written by experts from different backgrounds - academic and commercial, technical and organizational - this book provides a unique overview of and insight into current issues and future possibilities concerning extension of the World Wide Web for group working.

Hop Integrity in the Internet (Hardcover, 2006 ed.): Chin-tser Huang, Mohamed G Gouda Hop Integrity in the Internet (Hardcover, 2006 ed.)
Chin-tser Huang, Mohamed G Gouda
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. If a message that is part of a denial-of-service attack is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet.

A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in the suite is specified and verified using an abstract and formal notation called the Secure Protocol Notation. The protocols include:

- Secure address resolution

- Weak hop integrity

- Strong hop integrity using soft sequence numbers

- Strong hop integrity using hard sequence numbers

Other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast.

Ethical Digital Technology in Practice (Paperback): Simon Rogerson Ethical Digital Technology in Practice (Paperback)
Simon Rogerson
R1,637 Discovery Miles 16 370 Ships in 9 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience... The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) (Hardcover)
Alan Calder
R1,621 Discovery Miles 16 210 Ships in 18 - 22 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Network Control and Engineering for QoS, Security and Mobility, V - IFIP 19th World Computer Congress,TC-6, 5th IFIP... Network Control and Engineering for QoS, Security and Mobility, V - IFIP 19th World Computer Congress,TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility, August 20-25, 2006, Santiago, Chile (Hardcover, 2006 ed.)
Dominique Gaiti
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

The increasing demand for sophisticated network applications, allied to the growth of the Internet traffic, has lead to great efforts in the search of improvements in data transmission technologies with the intention of satisfying the increasing demand for bandwidth. So far as optical networking is concerned, WDM (Wavelength Division Multiplexing) appears as the main advance in the transmission area, because it allows transmission rates near to the theoretical limit of optical fibers, of the order of dozens of terabits a second [1]. An essential issue in optical network design is defining how the network will be controlled, that is, what type of signalling will be responsible for resource reservation, route determination and fault handling, among other functions that constitute the control plane. Label switching, which in IP networks is exemplified by MPLS (Multiprotocol Label Switching) [2], was extended through GMPLS (Generalized Multiprotocol Label Switching) [3] to operate with several different network technologies, where the label can be represented in other ways, for example, as time-slots in TDM networks, as physical switch ports and as wavelengths (lambdas) in WDM networks.

8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback): K Crawley 8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback)
K Crawley
R644 R564 Discovery Miles 5 640 Save R80 (12%) Ships in 9 - 17 working days

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Detecting Peripheral-based Attacks on the Host Memory (Hardcover, 2015 ed.): Patrick Stewin Detecting Peripheral-based Attacks on the Host Memory (Hardcover, 2015 ed.)
Patrick Stewin
R2,636 Discovery Miles 26 360 Ships in 18 - 22 working days

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.

Building the Knowledge Society on the Internet - Sharing and Exchanging Knowledge in Networked Environments (Hardcover): Ettore... Building the Knowledge Society on the Internet - Sharing and Exchanging Knowledge in Networked Environments (Hardcover)
Ettore Bolisani
R4,618 Discovery Miles 46 180 Ships in 18 - 22 working days

"In today's networked societies, a key factor of the social and economic success is the capability to exchange, transfer, and share knowledge. In the wide-ranging area of knowledge management, the issue of knowledge exchange in networked environments emerges in several application fields, and is treated with different approaches. Building the Knowledge Society on the Internet: Sharing and Exchanging Knowledge in Networked Environments proposes a vast panorama of research on the topic while presenting a variety of viewpoints, approaches, and indications of the shared elements intended as the foundations of an emerging and fascinating multidisciplinary field."

Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Hardcover, 2014 ed.): Aboul Ella Hassanien, Tai-Hoon... Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Hardcover, 2014 ed.)
Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad
R4,117 Discovery Miles 41 170 Ships in 18 - 22 working days

This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility."

Multimedia Encryption and Watermarking (Hardcover, 2005 ed.): Borko Furht, Edin Muharemagic, Daniel Socek Multimedia Encryption and Watermarking (Hardcover, 2005 ed.)
Borko Furht, Edin Muharemagic, Daniel Socek
R4,195 Discovery Miles 41 950 Ships in 18 - 22 working days

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property.

Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio sharing techniques. Part III, Digital Watermarking, introduces the concept of watermarking for multimedia, classifies watermarking applications, and evaluates various multimedia watermarking concepts and techniques, including digital watermarking techniques for binary images.

Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia content. This volume is also suitable as a textbook for graduate courses on multimedia security.

Guide to Wireless Network Security (Hardcover, 2006 ed.): John R Vacca Guide to Wireless Network Security (Hardcover, 2006 ed.)
John R Vacca
R4,870 R4,549 Discovery Miles 45 490 Save R321 (7%) Ships in 10 - 15 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability.
From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated edition)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R3,084 Discovery Miles 30 840 Ships in 10 - 15 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.

The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Cases on Telecommunications and Networking (Hardcover, illustrated edition): Mehdi Khosrowpour Cases on Telecommunications and Networking (Hardcover, illustrated edition)
Mehdi Khosrowpour
R2,285 Discovery Miles 22 850 Ships in 18 - 22 working days

Cases on Telecommunications and Networking presents a wide range of the most current issues related to the planning, design, maintenance, and management of telecommunications and networking technologies and applications in organizations. Real-life cases included in this publication clearly illustrate challenges and solutions associated with the effective utilization and management of telecommunications and networking technologies in modern organizations worldwide. ""Cases on Telecommunications and Networking"" provides practitioners, educators, and students with important examples of successes and failures in telecommunications and networking systems implementation. This publication is instrumental for those learning about the issues and challenges in the field of telecommunications and networking systems.

Open Source for Knowledge and Learning Management - Strategies Beyond Tools (Hardcover): Open Source for Knowledge and Learning Management - Strategies Beyond Tools (Hardcover)
R2,645 Discovery Miles 26 450 Ships in 18 - 22 working days

In the last years, knowledge and learning management have made a significant impact on the IT research community. ""Open Source for Knowledge and Learning Management: Strategies Beyond Tools"" presents learning and knowledge management from a point of view where the basic tools and applications are provided by open source technologies. ""Open Source for Knowledge and Learning Management: Strategies Beyond Tools"" explains an intense orientation to the critical issues of the open source paradigm: open source tools, applications, social networks, and knowledge sharing in open source communities. Open source technologies, tools, and applications are analyzed in the context of knowledge and learning, and this convergence formulates a challenging landscape for the deployment of information technology.

Building an Information Security Awareness Program (Paperback): Mark B. Desman Building an Information Security Awareness Program (Paperback)
Mark B. Desman
R3,080 Discovery Miles 30 800 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions.
Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Data Communication Principles - For Fixed and Wireless Networks (Hardcover, 2003 ed.): Aftab Ahmad Data Communication Principles - For Fixed and Wireless Networks (Hardcover, 2003 ed.)
Aftab Ahmad
R2,810 Discovery Miles 28 100 Ships in 18 - 22 working days

Data Communication Principles for Fixed and Wireless Networks focuses on the physical and data link layers. Included are examples that apply to a diversified range of higher level protocols such as TCP/IP, OSI and packet based wireless networks. Performance modeling is introduced for beginners requiring basic mathematics. Separate discussion has been included on wireless cellular networks performance and on the simulation of networks. Throughout the book, wireless LANS has been given the same level of treatment as fixed network protocols. It is assumed that readers would be familiar with basic mathematics and have some knowledge of binary number systems.
Data Communication Principles for Fixed and Wireless Networks is for students at the senior undergraduate and first year graduate levels. It can also be used as a reference work for professionals working in the areas of data networks, computer networks and internet protocols.

Approaches to Legal Ontologies - Theories, Domains, Methodologies (Hardcover, 2011 Ed.): Giovanni Sartor, Pompeu Casanovas,... Approaches to Legal Ontologies - Theories, Domains, Methodologies (Hardcover, 2011 Ed.)
Giovanni Sartor, Pompeu Casanovas, Mariangela Biasiotti, Meritxell Fernandez-Barrera
R2,808 Discovery Miles 28 080 Ships in 18 - 22 working days

Approaches to legal ontologies constitutes a collective reflection on the foundations of legal ontology engineering, by exploring current methodologies and theoretical approaches to defining legal ontologies, their divergences and complementarity and the challenges still to be faced. It gathers contributions from leading experts regarding their theoretical commitments and methodological approaches derived from a long experience in the area and presents a mature reflection on achievements and current shortcomings. The various authors reconstruct their concrete methodological frameworks by retrieving the more or less explicit theoretical choices that have guided their work on legal ontology engineering over the last years. This results in the presentation of apparently opposed but in fact complementary rationales for ontology building in the legal domain (legal-theoretical, sociolegal, philosophical, among others) that address the various dimensions of legal knowledge and its conceptual modelling. The book provides the reader with a unique source regarding the current theoretical landscape in legal ontology engineering as well as on foreseeable future trends for the definition of conceptual structures to enhance the automatic processing and retrieval of legal information in the Semantic Web framework. It will thus interest researchers in the domains of the SW, legal informatics, Artificial Intelligence and law, legal theory and legal philosophy, as well as developers of e-government applications based on the intelligent management of legal or public information to provide both back-office and front-office support.

Amazon Kinesis Data Streams Developer Guide (Hardcover): Documentation Team Amazon Kinesis Data Streams Developer Guide (Hardcover)
Documentation Team
R1,165 Discovery Miles 11 650 Ships in 18 - 22 working days
IPv6 in Practice - A Unixer's Guide to the Next Generation Internet (Hardcover, 2007 ed.): Benedikt Stockebrand IPv6 in Practice - A Unixer's Guide to the Next Generation Internet (Hardcover, 2007 ed.)
Benedikt Stockebrand
R1,468 Discovery Miles 14 680 Ships in 18 - 22 working days

Handling IPv6 for the first time is a challenging task even for the experienced system administrator. New concepts and mechanisms make it necessary to rethink well-established methods of the IPv4 protocol.

This book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily any IPv6 knowledge. It focuses on reliable and efficient operation of IPv6 implementations available today rather than on protocol specifications. Consequently, it covers the essential concepts - using instructive and thoroughly tested examples - on how to configure, to administrate, and to debug IPv6 setups. These foundations are complemented by discussions of best practices and strategic considerations aimed at overall efficiency, reliability, maintainability, and interoperation.

The examples in this book cover all relevant aspects concerning Debian GNU/Linux, FreeBSD, and Solaris. Examples about other Unix derivatives are available online at www.benedikt-stockebrand.de.

Data Mining in Dynamic Social Networks and Fuzzy Systems (Hardcover, New): Vishal Bhatnagar Data Mining in Dynamic Social Networks and Fuzzy Systems (Hardcover, New)
Vishal Bhatnagar
R4,962 Discovery Miles 49 620 Ships in 18 - 22 working days

Many organizations, whether in the public or private sector, have begun to take advantage of the tools and techniques used for data mining. Utilizing data mining tools, these organizations are able to reveal the hidden and unknown information from available data. Data Mining in Dynamic Social Networks and Fuzzy Systems brings together research on the latest trends and patterns of data mining tools and techniques in dynamic social networks and fuzzy systems. With these improved modern techniques of data mining, this publication aims to provide insight and support to researchers and professionals concerned with the management of expertise, knowledge, information, and organizational development.

Mastering VMware NSX for vSphere (Paperback): ES Sena Sosa Mastering VMware NSX for vSphere (Paperback)
ES Sena Sosa
R1,304 R1,082 Discovery Miles 10 820 Save R222 (17%) Ships in 18 - 22 working days

A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.

Teletraffic Technologies in ATM Networks (Hardcover): Hiroshi Saito Teletraffic Technologies in ATM Networks (Hardcover)
Hiroshi Saito
R2,985 Discovery Miles 29 850 Ships in 18 - 22 working days

This work surveys the various switching technologies, shows how to evaluate the performance of ATM networks and enables the reader to implement teletraffic control via connection admission control (CAC) and other traffic control methods. The text introduces the non-parametric approach for CAC and dimensioning and offers the hybrid CAC as an alternative solution to traffic control.

Big Data Analytics - Harnessing Data for New Business Models (Hardcover): Soraya Sedkaoui, Mounia Khelfaoui, Nadjat Kadi Big Data Analytics - Harnessing Data for New Business Models (Hardcover)
Soraya Sedkaoui, Mounia Khelfaoui, Nadjat Kadi
R3,950 Discovery Miles 39 500 Ships in 9 - 17 working days

This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business. It examines the role of analytics tools and methods of using big data in strengthening businesses to meet today's information challenges and shows how businesses can adapt big data for effective businesses practices. This volume shows how big data and the use of data analytics is being effectively adopted more frequently, especially in companies that are looking for new methods to develop smarter capabilities and tackle challenges in dynamic processes. Many illustrative case studies are presented that highlight how companies in every sector are now focusing on harnessing data to create a new way of doing business.

Mobile Peer-to-peer Computing for Next Generation Distributed Environments - Advancing Conceptual and Algorithmic Applications... Mobile Peer-to-peer Computing for Next Generation Distributed Environments - Advancing Conceptual and Algorithmic Applications (Hardcover)
Boon-Chong Seet
R5,026 Discovery Miles 50 260 Ships in 18 - 22 working days

Peer-to-peer computing has gained significant attention from both industry and research communities in the past decade as the number of users worldwide continues to grow along with demand for mobile computing. Mobile Peer-to-Peer Computing for Next Generation Distributed Environments: Advancing Conceptual and Algorithmic Applications focuses on current research and innovation in mobile and wireless technologies that address challenges from both a theoretical and applied perspective. This advanced publication provides researchers, practitioners, and academicians with an authoritative reference source to the latest state-of-the-art developments in this growing technology field.

Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.): Salvatore J Stolfo, Steven M. Bellovin, Shlomo... Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computational Information Geometry - For…
Frank Nielsen, Frank Critchley, … Hardcover R5,036 Discovery Miles 50 360
Growth Curve Models and Applications…
Ratan Dasgupta Hardcover R4,172 R3,371 Discovery Miles 33 710
Sparse Graphical Modeling for High…
Faming Liang, Bochao Jia Hardcover R2,782 Discovery Miles 27 820
Statistics and Analysis of Scientific…
Massimiliano Bonamente Hardcover R1,438 Discovery Miles 14 380
Statistical Analysis for…
Arnoldo Frigessi, Peter Buhlmann, … Hardcover R5,035 R4,714 Discovery Miles 47 140
Introduction to Statistics and Data…
Christian Heumann, Michael Schomaker, … Hardcover R2,487 Discovery Miles 24 870
Computational Statistics with R, Volume…
Marepalli B Rao, C.R. Rao Hardcover R4,389 Discovery Miles 43 890
Model-Free Prediction and Regression - A…
Dimitris N. Politis Hardcover R3,041 Discovery Miles 30 410
Recent Advances and Trends in…
M. G. Akritas, D.N. Politis Hardcover R3,172 Discovery Miles 31 720
Linear Time Series with MATLAB and…
Victor Gomez Hardcover R3,680 Discovery Miles 36 800

 

Partners