|
|
Books > Computing & IT > Computer communications & networking
Securing VoIP: Keeping Your VoIP Network Safe will show you how to
take the initiative to prevent hackers from recording and
exploiting your company's secrets. Drawing upon years of practical
experience and using numerous examples and case studies, technology
guru Bud Bates discusses the business realities that necessitate
VoIP system security and the threats to VoIP over both wire and
wireless networks. He also provides essential guidance on how to
conduct system security audits and how to integrate your existing
IT security plan with your VoIP system and security plans, helping
you prevent security breaches and eavesdropping.
Application of Big Data for National Security provides users with
state-of-the-art concepts, methods, and technologies for Big Data
analytics in the fight against terrorism and crime, including a
wide range of case studies and application scenarios. This book
combines expertise from an international team of experts in law
enforcement, national security, and law, as well as computer
sciences, criminology, linguistics, and psychology, creating a
unique cross-disciplinary collection of knowledge and insights into
this increasingly global issue. The strategic frameworks and
critical factors presented in Application of Big Data for National
Security consider technical, legal, ethical, and societal impacts,
but also practical considerations of Big Data system design and
deployment, illustrating how data and security concerns intersect.
In identifying current and future technical and operational
challenges it supports law enforcement and government agencies in
their operational, tactical and strategic decisions when employing
Big Data for national security
In the modern age of urbanisation, the mass population is becoming
progressively reliant on technical infrastructures. These
industrial buildings provide integral services to the general
public including the delivery of energy, information and
communication technologies, and maintenance of transport networks.
The safety and security of these structures is crucial as new
threats are continually emerging. Safety and Security Issues in
Technical Infrastructures is a pivotal reference source that
provides vital research on the modernisation of occupational
security and safety practices within information technology-driven
buildings. While highlighting topics such as explosion process
safety, nanotechnology, and infrastructural risk analysis, this
publication explores current risks and uncertainties and the
raising of comprehensive awareness for experts in this field. This
book is ideally designed for security managers, safety personnel,
civil engineers, architects, researchers, construction
professionals, strategists, educators, material scientists,
property owners, and students.
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R893
R812
Discovery Miles 8 120
Save R81 (9%)
|
Ships in 18 - 22 working days
|
|
|
 |
Cyberspace
(Hardcover)
Evon Abu-Taieh, Abdelkrim El Mouatasim, Issam H. Al Hadid
|
R3,079
Discovery Miles 30 790
|
Ships in 18 - 22 working days
|
|
|
In the past decade, the number of wireless devices has grown
exponentially. Decades ago, all systems were wired computer
systems. Wireless technology was not accessible in mobile and
portable devices until in recent years, and has followed a variety
of methods for encryption and resource management. The purpose of
the research in Optimizing IEE 802.11i Resources and Security
Essentials is to determine the issues of the performance in current
encryption methods in AES-CCMP in different types of devices and
handle it so that an optimized resource usage would be achieved
with the required security. Two modes for 802.11i for two different
groups of devices is suggested and evaluated with the current
encryption method for AES-CCMP to compare the performance. Almost
every organization in today's world relies on wireless networks to
transmit information, and much of that information should be kept
secure. Banking, healthcare, and the military are all vital
industries that rely on wireless security for a huge section of
their operations. Security experts of today and tomorrow will learn
a lot from Optimizing IEE 802.11i Resources and Security
Essentials, and it can be used for master level in computer
science, information security, wireless network security and
cryptography.
Data stealing is a major concern on the internet as hackers and
criminals have begun using simple tricks to hack social networks
and violate privacy. Cyber-attack methods are progressively modern,
and obstructing the attack is increasingly troublesome, regardless
of whether countermeasures are taken. The Dark Web especially
presents challenges to information privacy and security due to
anonymous behaviors and the unavailability of data. To better
understand and prevent cyberattacks, it is vital to have a forecast
of cyberattacks, proper safety measures, and viable use of
cyber-intelligence that empowers these activities. Dark Web Pattern
Recognition and Crime Analysis Using Machine Intelligence discusses
cyberattacks, security, and safety measures to protect data and
presents the shortcomings faced by researchers and practitioners
due to the unavailability of information about the Dark Web.
Attacker techniques in these Dark Web environments are highlighted,
along with intrusion detection practices and crawling of hidden
content. Covering a range of topics such as malware and fog
computing, this reference work is ideal for researchers,
academicians, practitioners, industry professionals, computer
scientists, scholars, instructors, and students.
The Western cultural trend of self-representation is transcending
borders as it permeates the online world. A prime example of this
trend is selfies, and how they have evolved into more than just
self-portraits. Selfies as a Mode of Social Media and Work Space
Research is a comprehensive reference source for the latest
research on explicit and implicit messaging of self-portraiture and
its indications about individuals, groups, and societies. Featuring
coverage on a broad range of topics including dating, job hunting,
and marketing, this publication is ideally designed for
academicians, researchers, and professionals interested in the
current phenomenon of selfies and their impact on society.
"Surveillance and Threat Detection" offers readers a complete
understanding of the terrorist/criminal cycle, and how to interrupt
that cycle to prevent an attack.
Terrorists and criminals often rely on pre-attack and
pre-operational planning and surveillance activities that can last
a period of weeks, months, or even years. Identifying and
disrupting this surveillance is key to prevention of attacks. The
systematic capture of suspicious events and the correlation of
those events can reveal terrorist or criminal surveillance,
allowing security professionals to employ appropriate
countermeasures and identify the steps needed to apprehend the
perpetrators. The results will dramatically increase the
probability of prevention while streamlining protection assets and
costs.
Readers of "Surveillance and Threat Detection" will draw from
real-world case studies that apply to their real-world security
responsibilities. Ultimately, readers will come away with an
understanding of how surveillance detection at a high-value, fixed
site facility can be integrated into an overall security footprint
for any organization.
Understand the terrorist/criminal cycle and how to interrupt that
cycle to prevent an attackUnderstand how to encapsulate criminal
and terrorist surveillance, analyze suspicious activity reports,
and use an all-hazard, threat-based surveillance detection
protection programAccess a full ancillary package, including
instructor's manual, test banks, and student study exams
There is considerably more skill in the IT and security
communities than is reflected in the jobs people are able to
attain. Most people's limiting factor in their ability to get
better jobs is not technical skills or even the soft skills
necessary to do well in a new job. It is that getting a job is a
completely different skill set and one that most people only
practice every few years. "
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt
Game "explains the job hunting process, why the most commonly
followed models fail and how to better approach the search. It
covers the entire job hunt process from when to decide to leave
your current job, research new possible job opportunities,
targeting your new boss, controlling the job interview process and
negotiating your new compensation and the departure from your
current job.
This is not a complete all-in-one job-hunting book. This book
assumes that the reader is reasonably competent and has already
heard most of the "standard" advice, but is having difficulty
putting the advice into practice. The goal is to fill in the gaps
of the other books and to help the readers use their technical
skills to their advantage in a different context.
The emphasis in "Job Reconnaissance "is for infosec and IT job
seekers to leverage the same skills they use in penetration testing
and recon toward job-hunting success. These skills include
targeting, reconnaissance and profiling combined with a technical
look at skills other career search bookscommonly miss.
Covers the entire job hunt process from when to decide to leave
your current job to the departure of your current jobSuggests how
to research new possible job opportunitiesShows how to target your
new boss, controlling the job interview process and negotiating
your new compensation "
While security is of vital importance to ensure the integrity of
communications in wireless and mobile networks, most businesses
which rely on these networks expect a high level of security and
privacy to ensure the integrity and confidentiality of
communications among terminals, networks, applications, and
services. Security, Privacy, Trust, and Resource Management in
Mobile and Wireless Communications examines the current scope of
theoretical and practical applications on the security of mobile
and wireless communications. This book covers fundamental concepts
of current issues, challenges, and solutions in wireless and mobile
networks and will serve as a reference for graduate students,
professors, and researchers in this emerging field.
"Network and System Security" provides focused coverage of
network and system security technologies. It explores practical
solutions to a wide range of network and systems security issues.
Chapters are authored by leading experts in the field and address
the immediate and long-term challenges in the authors respective
areas of expertise. Coverage includes building a secure
organization, cryptography, system intrusion, UNIX and Linux
security, Internet security, intranet security, LAN security;
wireless network security, cellular network security, RFID
security, and more.
Chapters contributed by leaders in the field covering foundational
and practical aspects of system and network security, providing a
new level of technical expertise not found elsewhereComprehensive
and updated coverage of the subject area allows the reader to put
current technologies to workPresents methods of analysis and
problem solving techniques, enhancing the reader s grasp of the
material and ability to implement practical solutions"
|
|