|
|
Books > Computing & IT > Computer communications & networking
The emerging field of network science represents a new style of
research that can unify such traditionally-diverse fields as
sociology, economics, physics, biology, and computer science. It is
a powerful tool in analyzing both natural and man-made systems,
using the relationships between players within these networks and
between the networks themselves to gain insight into the nature of
each field. Until now, studies in network science have been focused
on particular relationships that require varied and
sometimes-incompatible datasets, which has kept it from being a
truly universal discipline. Computational Network Science seeks to
unify the methods used to analyze these diverse fields. This book
provides an introduction to the field of Network Science and
provides the groundwork for a computational, algorithm-based
approach to network and system analysis in a new and important way.
This new approach would remove the need for tedious human-based
analysis of different datasets and help researchers spend more time
on the qualitative aspects of network science research.
Advancing technologies, especially computer technologies, have
necessitated the creation of a comprehensive investigation and
collection methodology for digital and online evidence. The goal of
cyber forensics is to perform a structured investigation while
maintaining a documented chain of evidence to find out exactly what
happened on a computing device or on a network and who was
responsible for it. Critical Concepts, Standards, and Techniques in
Cyber Forensics is a critical research book that focuses on
providing in-depth knowledge about online forensic practices and
methods. Highlighting a range of topics such as data mining,
digital evidence, and fraud investigation, this book is ideal for
security analysts, IT specialists, software engineers, researchers,
security professionals, criminal science professionals,
policymakers, academicians, and students.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to
take the initiative to prevent hackers from recording and
exploiting your company's secrets. Drawing upon years of practical
experience and using numerous examples and case studies, technology
guru Bud Bates discusses the business realities that necessitate
VoIP system security and the threats to VoIP over both wire and
wireless networks. He also provides essential guidance on how to
conduct system security audits and how to integrate your existing
IT security plan with your VoIP system and security plans, helping
you prevent security breaches and eavesdropping.
As the world becomes digitalized, developing countries are starting
to see an increase in technological advancements being integrated
into their society. These advancements are creating opportunities
to improve both the economy and the lives of people within these
areas. Affordability Issues Surrounding the Use of ICT for
Development and Poverty Reduction is a relevant scholarly
publication that examines the importance of information and
communications technology (ICT) and its ability to aid in
developing countries and the methods to make such technologies more
accessible and cost less. Featuring coverage on a wide range of
topics, including community networks, infrastructure sharing, and
the digital divide, this book is geared toward academics,
technology developers, researchers, students, practitioners, and
professionals interested in the importance of understanding
technological innovations.
Application of Big Data for National Security provides users with
state-of-the-art concepts, methods, and technologies for Big Data
analytics in the fight against terrorism and crime, including a
wide range of case studies and application scenarios. This book
combines expertise from an international team of experts in law
enforcement, national security, and law, as well as computer
sciences, criminology, linguistics, and psychology, creating a
unique cross-disciplinary collection of knowledge and insights into
this increasingly global issue. The strategic frameworks and
critical factors presented in Application of Big Data for National
Security consider technical, legal, ethical, and societal impacts,
but also practical considerations of Big Data system design and
deployment, illustrating how data and security concerns intersect.
In identifying current and future technical and operational
challenges it supports law enforcement and government agencies in
their operational, tactical and strategic decisions when employing
Big Data for national security
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R893
R812
Discovery Miles 8 120
Save R81 (9%)
|
Ships in 18 - 22 working days
|
|
|
In the past decade, the number of wireless devices has grown
exponentially. Decades ago, all systems were wired computer
systems. Wireless technology was not accessible in mobile and
portable devices until in recent years, and has followed a variety
of methods for encryption and resource management. The purpose of
the research in Optimizing IEE 802.11i Resources and Security
Essentials is to determine the issues of the performance in current
encryption methods in AES-CCMP in different types of devices and
handle it so that an optimized resource usage would be achieved
with the required security. Two modes for 802.11i for two different
groups of devices is suggested and evaluated with the current
encryption method for AES-CCMP to compare the performance. Almost
every organization in today's world relies on wireless networks to
transmit information, and much of that information should be kept
secure. Banking, healthcare, and the military are all vital
industries that rely on wireless security for a huge section of
their operations. Security experts of today and tomorrow will learn
a lot from Optimizing IEE 802.11i Resources and Security
Essentials, and it can be used for master level in computer
science, information security, wireless network security and
cryptography.
As information resources migrate to the Cloud and to local and
global networks, protecting sensitive data becomes ever more
important. In the modern, globally-interconnected world, security
and privacy are ubiquitous concerns. Next Generation Wireless
Network Security and Privacy addresses real-world problems
affecting the security of information communications in modern
networks. With a focus on recent developments and solutions, as
well as common weaknesses and threats, this book benefits
academicians, advanced-level students, researchers, computer
scientists, and software development specialists. This cutting-edge
reference work features chapters on topics including UMTS security,
procedural and architectural solutions, common security issues, and
modern cryptographic algorithms, among others.
In the modern age of urbanisation, the mass population is becoming
progressively reliant on technical infrastructures. These
industrial buildings provide integral services to the general
public including the delivery of energy, information and
communication technologies, and maintenance of transport networks.
The safety and security of these structures is crucial as new
threats are continually emerging. Safety and Security Issues in
Technical Infrastructures is a pivotal reference source that
provides vital research on the modernisation of occupational
security and safety practices within information technology-driven
buildings. While highlighting topics such as explosion process
safety, nanotechnology, and infrastructural risk analysis, this
publication explores current risks and uncertainties and the
raising of comprehensive awareness for experts in this field. This
book is ideally designed for security managers, safety personnel,
civil engineers, architects, researchers, construction
professionals, strategists, educators, material scientists,
property owners, and students.
 |
Cyberspace
(Hardcover)
Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid
|
R3,079
Discovery Miles 30 790
|
Ships in 18 - 22 working days
|
|
|
"Surveillance and Threat Detection" offers readers a complete
understanding of the terrorist/criminal cycle, and how to interrupt
that cycle to prevent an attack.
Terrorists and criminals often rely on pre-attack and
pre-operational planning and surveillance activities that can last
a period of weeks, months, or even years. Identifying and
disrupting this surveillance is key to prevention of attacks. The
systematic capture of suspicious events and the correlation of
those events can reveal terrorist or criminal surveillance,
allowing security professionals to employ appropriate
countermeasures and identify the steps needed to apprehend the
perpetrators. The results will dramatically increase the
probability of prevention while streamlining protection assets and
costs.
Readers of "Surveillance and Threat Detection" will draw from
real-world case studies that apply to their real-world security
responsibilities. Ultimately, readers will come away with an
understanding of how surveillance detection at a high-value, fixed
site facility can be integrated into an overall security footprint
for any organization.
Understand the terrorist/criminal cycle and how to interrupt that
cycle to prevent an attackUnderstand how to encapsulate criminal
and terrorist surveillance, analyze suspicious activity reports,
and use an all-hazard, threat-based surveillance detection
protection programAccess a full ancillary package, including
instructor's manual, test banks, and student study exams
|
|