|
|
Books > Computing & IT > Computer communications & networking
The Smart Grid security ecosystem is complex and
multi-disciplinary, and relatively under-researched compared to the
traditional information and network security disciplines. While the
Smart Grid has provided increased efficiencies in monitoring power
usage, directing power supplies to serve peak power needs and
improving efficiency of power delivery, the Smart Grid has also
opened the way for information security breaches and other types of
security breaches. Potential threats range from meter manipulation
to directed, high-impact attacks on critical infrastructure that
could bring down regional or national power grids. It is essential
that security measures are put in place to ensure that the Smart
Grid does not succumb to these threats and to safeguard this
critical infrastructure at all times. Dr. Florian Skopik is one of
the leading researchers in Smart Grid security, having organized
and led research consortia and panel discussions in this field.
Smart Grid Security will provide the first truly holistic view of
leading edge Smart Grid security research. This book does not focus
on vendor-specific solutions, instead providing a complete
presentation of forward-looking research in all areas of Smart Grid
security. The book will enable practitioners to learn about
upcoming trends, scientists to share new directions in research,
and government and industry decision-makers to prepare for major
strategic decisions regarding implementation of Smart Grid
technology.
The Western cultural trend of self-representation is transcending
borders as it permeates the online world. A prime example of this
trend is selfies, and how they have evolved into more than just
self-portraits. Selfies as a Mode of Social Media and Work Space
Research is a comprehensive reference source for the latest
research on explicit and implicit messaging of self-portraiture and
its indications about individuals, groups, and societies. Featuring
coverage on a broad range of topics including dating, job hunting,
and marketing, this publication is ideally designed for
academicians, researchers, and professionals interested in the
current phenomenon of selfies and their impact on society.
This book provides an authoritative guide for postgraduate students
and academic researchers in electronics, computer and network
engineering, telecommunications, energy technology and home
automation, as well as R&D managers in industrial sectors such
as wireless technology, consumer electronics, telecommunications
and networking, information technology, energy technology and home
automation. Part One outlines the key principles and technologies
needed for ecological smart home networks. Beginning with a
thorough overview of the concept behind ecological smart home
network design, the book reviews such important areas as power line
communications, hybrid systems and middleware platforms. Part Two
then goes on to discuss some important applications of this
technology, with wireless smart sensor networks for home and
telecare, and smart home networking for content and energy
management (including the intelligent Zero Emission Urban System),
all explored in detail.
As computers continue to remain essential tools for the pursuit of
physics, medicine, economics, social sciences, and more,
supercomputers are proving that they can further extend and greatly
enhance as-of-yet undiscovered knowledge and solve the world's most
complex problems. As these instruments continue to lead to
groundbreaking discoveries and breakthroughs, it is imperative that
research remains up to date with the latest findings and uses. The
Handbook of Research on Methodologies and Applications of
Supercomputing is a comprehensive and critical reference book that
provides research on the latest advances of control flow and
dataflow supercomputing and highlights selected emerging big data
applications needing high acceleration and/or low power.
Consequently, this book advocates the need for hybrid computing,
where the control flow part represents the host architecture and
dataflow part represents the acceleration architecture. These
issues cover the initial eight chapters. The remaining eight
chapters cover selected modern applications that are best
implemented on a hybrid computer, in which the transactional parts
(serial code) are implemented on the control flow part and the
loops (parallel code) on the dataflow part. These final eight
chapters cover two major application domains: scientific computing
and computing for digital economy. This book offers applications in
marketing, medicine, energy systems, and library science, among
others, and is an essential source for scientists, programmers,
engineers, practitioners, researchers, academicians, and students
interested in the latest findings and advancements in
supercomputing.
The emerging field of network science represents a new style of
research that can unify such traditionally-diverse fields as
sociology, economics, physics, biology, and computer science. It is
a powerful tool in analyzing both natural and man-made systems,
using the relationships between players within these networks and
between the networks themselves to gain insight into the nature of
each field. Until now, studies in network science have been focused
on particular relationships that require varied and
sometimes-incompatible datasets, which has kept it from being a
truly universal discipline. Computational Network Science seeks to
unify the methods used to analyze these diverse fields. This book
provides an introduction to the field of Network Science and
provides the groundwork for a computational, algorithm-based
approach to network and system analysis in a new and important way.
This new approach would remove the need for tedious human-based
analysis of different datasets and help researchers spend more time
on the qualitative aspects of network science research.
Advancing technologies, especially computer technologies, have
necessitated the creation of a comprehensive investigation and
collection methodology for digital and online evidence. The goal of
cyber forensics is to perform a structured investigation while
maintaining a documented chain of evidence to find out exactly what
happened on a computing device or on a network and who was
responsible for it. Critical Concepts, Standards, and Techniques in
Cyber Forensics is a critical research book that focuses on
providing in-depth knowledge about online forensic practices and
methods. Highlighting a range of topics such as data mining,
digital evidence, and fraud investigation, this book is ideal for
security analysts, IT specialists, software engineers, researchers,
security professionals, criminal science professionals,
policymakers, academicians, and students.
Securing VoIP: Keeping Your VoIP Network Safe will show you how to
take the initiative to prevent hackers from recording and
exploiting your company's secrets. Drawing upon years of practical
experience and using numerous examples and case studies, technology
guru Bud Bates discusses the business realities that necessitate
VoIP system security and the threats to VoIP over both wire and
wireless networks. He also provides essential guidance on how to
conduct system security audits and how to integrate your existing
IT security plan with your VoIP system and security plans, helping
you prevent security breaches and eavesdropping.
Vehicular Communications and Networks: Architectures, Protocols,
Operation and Deployment discusses VANETs (Vehicular Ad-hoc
Networks) or VCS (Vehicular Communication Systems), which can
improve safety, decrease fuel consumption, and increase the
capacity of existing roadways and which is critical for the
Intelligent Transportation System (ITS) industry. Part one covers
architectures for VCS, part two describes the physical layer,
antenna technologies and propagation models, part three explores
protocols, algorithms, routing and information dissemination, and
part four looks at the operation and deployment of vehicular
communications and networks.
Application of Big Data for National Security provides users with
state-of-the-art concepts, methods, and technologies for Big Data
analytics in the fight against terrorism and crime, including a
wide range of case studies and application scenarios. This book
combines expertise from an international team of experts in law
enforcement, national security, and law, as well as computer
sciences, criminology, linguistics, and psychology, creating a
unique cross-disciplinary collection of knowledge and insights into
this increasingly global issue. The strategic frameworks and
critical factors presented in Application of Big Data for National
Security consider technical, legal, ethical, and societal impacts,
but also practical considerations of Big Data system design and
deployment, illustrating how data and security concerns intersect.
In identifying current and future technical and operational
challenges it supports law enforcement and government agencies in
their operational, tactical and strategic decisions when employing
Big Data for national security
Introduction to US Cybersecurity Careers is a concise introduction
to the world of cybersecurity and the career opportunities therein.
This book provides a basic rundown of industry sectors, roles, and
places to search for job opportunities within the US cybersecurity
industry. Within this book is vital information for anyone trying
to get into the industry - basic knowledge for those looking to
start training for a career, tips on networking and resume-building
in a fast-evolving and nontraditional sector, and advice on how to
get your foot in the door and become recognized in your field. This
book is designed to help those who are just starting out in
cybersecurity and those who have training and knowledge and want to
get into the industry. Introduction to US Cybersecurity Careers is
your first-stop reference for everything you need to know to start
your journey.
How to Defeat Advanced Malware is a concise introduction to the
concept of micro-virtualization. The book provides current facts
and figures that prove detection- based security products have
become ineffective. A simple strategy is then presented that both
leverages the opportunities presented by Bring Your Own Device
(BYOD) and protects enterprise end users against advanced malware.
The book concludes with case studies demonstrating how hardware-
isolated micro-VMs are helping Fortune 500 financial service
providers defeat advanced malware. This book is primarily designed
for infosec professionals, consultants, network administrators,
CIO's, CTO's, CISO's and senior executives who work within the
financial industry and are responsible for their company's endpoint
protection. How to Defeat Advanced Malware: New Tools for
Protection and Forensics is the first book to compare and contrast
current endpoint security products, while making a case for
encouraging and facilitating the growth of BYOD and social media by
adopting micro-virtualization.
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R893
R812
Discovery Miles 8 120
Save R81 (9%)
|
Ships in 18 - 22 working days
|
|
|
How to Attack and Defend Your Website is a concise introduction to
web security that includes hands-on web hacking tutorials. The book
has three primary objectives: to help readers develop a deep
understanding of what is happening behind the scenes in a web
application, with a focus on the HTTP protocol and other underlying
web technologies; to teach readers how to use the industry standard
in free web application vulnerability discovery and exploitation
tools - most notably Burp Suite, a fully featured web application
testing tool; and finally, to gain knowledge of finding and
exploiting the most common web security vulnerabilities. This book
is for information security professionals and those looking to
learn general penetration testing methodology and how to use the
various phases of penetration testing to identify and exploit
common web protocols. How to Attack and Defend Your Website is be
the first book to combine the methodology behind using penetration
testing tools such as Burp Suite and Damn Vulnerable Web
Application (DVWA), with practical exercises that show readers how
to (and therefore, how to prevent) pwning with SQLMap and using
stored XSS to deface web pages.
The HCISPP certification is a globally-recognized, vendor-neutral
exam for healthcare information security and privacy professionals,
created and administered by ISC(2). The new HCISPP certification,
focused on health care information security and privacy, is similar
to the CISSP, but has only six domains and is narrowly targeted to
the special demands of health care information security. Tim Virtue
and Justin Rainey have created the HCISPP Study Guide to walk you
through all the material covered in the exam's Common Body of
Knowledge. The six domains are covered completely and as concisely
as possible with an eye to acing the exam. Each of the six domains
has its own chapter that includes material to aid the test-taker in
passing the exam, as well as a chapter devoted entirely to
test-taking skills, sample exam questions, and everything you need
to schedule a test and get certified. Put yourself on the forefront
of health care information privacy and security with the HCISPP
Study Guide and this valuable certification.
In the past decade, the number of wireless devices has grown
exponentially. Decades ago, all systems were wired computer
systems. Wireless technology was not accessible in mobile and
portable devices until in recent years, and has followed a variety
of methods for encryption and resource management. The purpose of
the research in Optimizing IEE 802.11i Resources and Security
Essentials is to determine the issues of the performance in current
encryption methods in AES-CCMP in different types of devices and
handle it so that an optimized resource usage would be achieved
with the required security. Two modes for 802.11i for two different
groups of devices is suggested and evaluated with the current
encryption method for AES-CCMP to compare the performance. Almost
every organization in today's world relies on wireless networks to
transmit information, and much of that information should be kept
secure. Banking, healthcare, and the military are all vital
industries that rely on wireless security for a huge section of
their operations. Security experts of today and tomorrow will learn
a lot from Optimizing IEE 802.11i Resources and Security
Essentials, and it can be used for master level in computer
science, information security, wireless network security and
cryptography.
As information resources migrate to the Cloud and to local and
global networks, protecting sensitive data becomes ever more
important. In the modern, globally-interconnected world, security
and privacy are ubiquitous concerns. Next Generation Wireless
Network Security and Privacy addresses real-world problems
affecting the security of information communications in modern
networks. With a focus on recent developments and solutions, as
well as common weaknesses and threats, this book benefits
academicians, advanced-level students, researchers, computer
scientists, and software development specialists. This cutting-edge
reference work features chapters on topics including UMTS security,
procedural and architectural solutions, common security issues, and
modern cryptographic algorithms, among others.
In recent years, building a corporate online presence has become
nonnegotiable for businesses, as consumers expect to connect with
them in as many ways as possible. There are benefits to companies
that use online technology, but there are risks as well. Managing
Online Risk presents the tools and resources needed to better
understand the security and reputational risks of online and
digital activity, and how to mitigate those risks to minimize
potential losses. Managing Online Risk highlights security and risk
management best practices that address concerns such as data
collection and storage, liability, recruitment, employee
communications, compliance violations, security of devices (in
contexts like mobile, apps, and cloud computing), and more.
Additionally, this book offers a companion website that was
developed in parallel with the book and includes the latest updates
and resources for topics covered in the book.
|
|