![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
The worldwide reach of the Internet allows malicious cyber
criminals to coordinate and launch attacks on both cyber and
cyber-physical infrastructure from anywhere in the world. This
purpose of this handbook is to introduce the theoretical
foundations and practical solution techniques for securing critical
cyber and physical infrastructures as well as their underlying
computing and communication architectures and systems. Examples of
such infrastructures include utility networks (e.g., electrical
power grids), ground transportation systems (automotives, roads,
bridges and tunnels), airports and air traffic control systems,
wired and wireless communication and sensor networks, systems for
storing and distributing water and food supplies, medical and
healthcare delivery systems, as well as financial, banking and
commercial transaction assets. The handbook focus mostly on the
scientific foundations and engineering techniques - while also
addressing the proper integration of policies and access control
mechanisms, for example, how human-developed policies can be
properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
Service Oriented Architecture (SOA) is the paradigm for software and system specification, design, implementation and management that intends to shape and dominate IT and business landscapes in the near future. Non-Functional Properties in Service Oriented Architecture: Requirements, Models and Methods offers a selection of chapters that cover three important aspects related to the use of non-functional properties in SOA: requirements specification with respect to non-functional properties, modeling non-functional properties and implementation of non-functional properties. This book serves as both a practical reference and an advanced scientific source for those interested in current issues, new trends, and yet-unresolved areas of the discipline.
Dynamic, trustworthy and reliable service delivery in Service Oriented Architectures (SOA) is one of the main preconditions for successful and sustainable business operations. Service and business process reliability is, therefore, of paramount importance and cannot be compromised. Engineering Reliable Service Oriented Architecture: Managing Complexity and Service Level Agreements presents a guide to engineering reliable SOA systems and enhances current understanding of service reliability. It is an essential reference for both practitioners and researchers wishing to explore state-of-the art results from the field of reliable SOA application engineering.
In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.
The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.
Get ready for a career in IT security and efficiently prepare for the SY0-601 exam with a single, comprehensive resource CompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601. Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Perfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.
Recent technology trends involving the combination of mobile networks and cloud computing have offered new chances for mobile network providers to use specific carrier-cloud services. These advancements will enhance the utilization of the mobile cloud in industry and corporate settings. Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications is a fundamental source for the advancement of knowledge, application, and practice in the interdisciplinary areas of mobile network and cloud computing. By addressing innovative concepts and critical issues, this book is essential for researchers, practitioners, and students interested in the emerging field of vehicular wireless networks.
Private cloud computing enables you to consolidate diverse
enterprise systems into one that is cloud-based and can be accessed
by end-users seamlessly, regardless of their location or changes in
overall demand. Expert authors Steve Smoot and Nam K. Tan distill
their years of networking experience to describe how to build
enterprise networks to create a private cloud. With their
techniques you'll create cost-saving designs and increase the
flexibility of your enterprise, while maintaining the security and
control of an internal network. "Private Cloud Computing "offers a
complete cloud architecture for enterprise networking by
synthesizing WAN optimization, next-generation data centers, and
virtualization in a network-friendly way, tying them together into
a complete solution that can be progressively migrated to as time
and resources permit.
Radio Frequency Identification (RFID) technology may become one of the most pervasive technologies of the near future. Yet the widespread adoption of this new technology presents security risks that have not been sufficiently addressed.Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID highlights new research regarding wireless identification and sensing platform (WISP) tags, security, and applications. It serves as a reference on WISP technology and presents recent advances in this field. This volume serves as a useful reference for security experts, will introduce RFID professionals to new trends in this area, and can also be used by IT experts looking to utilize this technology.
About 25 years ago, the first developments of ANT (Actor-Network Theory) took place, but it wasn t until much later that researchers began to take it seriously. In the late 1990s, ANT began to take hold in the scientific community as a new and exciting approach to socio-technical research and social theory. Actor-Network Theory and Technology Innovation: Advancements and New Concepts provides a comprehensive look at the development of actor-network theory itself, as well as case studies of its use to assist in the explanation of various socio-technical phenomena. This book includes topics relating to technological innovation; both those using actor-network theory as an explanatory framework and those using other approaches. It is an excellent source of information regarding ANT as an approach to technological innovation and its link to ICT (Information Communication Technology).
Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. The Handbook of Research on Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.
The ever-evolving wireless technology industry is demanding new technologies and standards to ensure a higher quality of experience for global end-users. This developing challenge has enabled researchers to identify the present trend of machine learning as a possible solution, but will it meet business velocity demand? Next-Generation Wireless Networks Meet Advanced Machine Learning Applications is a pivotal reference source that provides emerging trends and insights into various technologies of next-generation wireless networks to enable the dynamic optimization of system configuration and applications within the fields of wireless networks, broadband networks, and wireless communication. Featuring coverage on a broad range of topics such as machine learning, hybrid network environments, wireless communications, and the internet of things; this publication is ideally designed for industry experts, researchers, students, academicians, and practitioners seeking current research on various technologies of next-generation wireless networks.
The growth, scale, and prominence of video applications over the
years have placed emphasis on the most scalable and efficient way
to deliver multi-play content (voice, video and data) to the end
user. Multicast is the most effective and efficient carrier of
video applications from a network standpoint. Financial
organizations deploy large-scale multicast infrastructures to
enable trading and e-commerce. The introduction of 4G and beyond
makes this technology even more indispensible since mobile
operators need an efficient mechanism to deliver repetitive content
to many a handset, and multicast is the answer. Thisis the first
book to distill information on this topic from disparate sources.
It is written by one of the early implementers, andis the go-to
referencefor deploying the Next Generation model.Thisbook proves
areal benefit to networking professionals from service providers,
enterprises, the vendor community, and anyone elsewho wants to
understand this fast emerging and popular scheme of deployment from
a vendor-neutral standpoint. Provides the background necessary to understand current generation multi-play applications and their service requirements Includes practical tips on various migration options available for moving to the Next Generation framework from the legacy"
Recently, the event-based paradigm, a burgeoning technology receiving attention in research as well as industry, has gained momentum in the commercial world causing a need for further research in the field. Principles and Applications of Distributed Event-Based Systems showcases event-based systems in real-world applications, providing an overview of relevant terminology and content approachable for readers from a variety of backgrounds. Containing expert international contributions, this advanced publication provides professionals, researchers, and students in systems design with a rich compendium of latest applications in the field.
Cloud Computing Service and Deployment Models: Layers and Management presents a collection of diverse perspectives on cloud computing and its vital role in all components of organizations. With its intent to benefit practitioners and industry professionals, this book aims to improve the understanding of cloud computing and tackle related concerns such as change management, security, processing approaches, and much more.
Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.
Technology trends may come and go, but cloud computing technologies have been gaining consideration in the commercial world due to its ability to provide on-demand access to resources, control the software environment, and supplement existing systems. Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives explores the latest innovations with cloud computing and the impact of these new models and technologies. This book will present case studies and research on the future of cloud computing technologies and its ability to increase connectivity of various entities of the world. It is an essential resource for technology practitioners, engineers, managers, and academics aiming to gain the knowledge of these novel and pervasive technologies.
While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book s expansive coverage on the topic. |
You may like...
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders
Paperback
R1,469
Discovery Miles 14 690
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,452
Discovery Miles 14 520
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,318
Discovery Miles 13 180
|