0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (341)
  • R250 - R500 (946)
  • R500+ (16,435)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cyber-Physical Systems - A Comprehensive Guide (Hardcover): Nonita Sharma, L K Awasthi, Monika Mangla, K.P. Sharma, Rohit Kumar Cyber-Physical Systems - A Comprehensive Guide (Hardcover)
Nonita Sharma, L K Awasthi, Monika Mangla, K.P. Sharma, Rohit Kumar
R4,362 Discovery Miles 43 620 Ships in 12 - 17 working days

Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective, underlying theories, modelling, and the applications of Cyber Physical Systems (CPS). It aims to cover all topics ranging from discussion of ru-diments of the system, efficient management, to recent research challenges and issues. Editors aim to present the book in a self-sufficient manner and to achieve this, the book has been edited to include all the aspects of CPS. The book fo-cuses on the concept map of CPS including latest technological interventions; issues, challenges, and the integration of CPS with IoT & Big Data Analytics. This aims to bring together unique contributions on cyber-physical systems research and education with applications in industrial, agriculture, and medical domains. The main aim of the book is to provide a roadmap to the latest advancements to provide optimal solutions in the field of CPS. Features * Coverage of rudiments of the subject * Discussion of recent advancements in the associated field * Considers an audience of diverse domains * Suitable for students (both UG and PG level) and researchers in the field of CPS This book aims to present the emergence of Cyber Physical Systems in response to revolutionary advancements in IoT. While discussing the associated challenges, it also endeavors to devise efficient models which are competent to address these challenges. This book aims to cater to researchers and academicians working in the related field of CPS.

An Interdisciplinary Approach to Modern Network Security (Hardcover): Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia,... An Interdisciplinary Approach to Modern Network Security (Hardcover)
Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le
R3,173 Discovery Miles 31 730 Ships in 12 - 17 working days

An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.

Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Hardcover):... Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Hardcover)
Ravi Das
R3,185 Discovery Miles 31 850 Ships in 12 - 17 working days

The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given equipment that has not been properly secured or must use personal devices to perform office work. The proliferation of videoconferencing has brought about new types of cyber-attacks. When the pandemic struck, many organizations found they had no, or old and unworkable, business continuity and disaster recovery plans. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic reviews the COVID-19 pandemic and related information security issues. It then develops a series of lessons learned from this reviews and explains how organizations can prepare for the next global mega disaster. The following presents some of the key lessons learned: The lack of vetting for third party suppliers and vendors The lack of controls surrounding data privacy, especially as it relates to the personal identifiable information (PPI) data sets The intermingling of home and corporate networks The lack of a secure remote workforce The emergence of supply chain attacks (e.g., Solar Winds) To address the issues raised in these lessons learned, CISOs and their security teams must have tools and methodologies in place to address the following: The need for incident response, disaster recovery, and business continuity plans The need for effective penetration testing The importance of threat hunting The need for endpoint security The need to use the SOAR model The importance of a zero-trust framework This book provides practical coverage of these topics to prepare information security professionals for any type of future disaster. The COVID-19 pandemic has changed the entire world to unprecedented and previously unimaginable levels. Many businesses, especially in the United States, were completely caught off guard, and they had no concrete plans put into place, from a cybersecurity standpoint, for how to deal with this mega disaster. This how-to book fully prepares CIOs, CISOs, and their teams for the next disaster, whether natural or manmade, with the various lessons that have been learned thus far from the COVID-19 pandemic.

Design of Network Coding Schemes in Wireless Networks (Hardcover): Zihuai Lin Design of Network Coding Schemes in Wireless Networks (Hardcover)
Zihuai Lin
R3,322 Discovery Miles 33 220 Ships in 12 - 17 working days

This book provides a consolidated view of the various network coding techniques to be implemented at the design of the wireless networks for improving its overall performance. It covers multiple sources communicating with multiple destinations via a common relay followed by network coded modulation schemes for multiple access relay channels. Performance of the distributed systems based on distributed convolutional codes with network coded modulation is covered including a two-way relay channel (TWRC). Two MIF protocols are proposed including derivation of signal-to-noise ratio (SNR) and development of threshold of the channel conditions of both. Features: Systematically investigates coding and modulation for wireless relay networks. Discusses how to apply lattice codes in implementing lossless communications and lossy source coding over a network. Focusses on theoretical approach for performance optimization. Includes various network coding strategies for different networks. Reviews relevant existing and ongoing research in optimization along with practical code design. This book aims at Researchers, Professionals and Graduate students in Networking, Communications, Information, Coding Theory, Theoretical Computer Science, Performance Analysis and Resource Optimization, Applied Discrete Mathematics, and Applied Probability.

6G: The Next Horizon - From Connected People and Things to Connected Intelligence (Hardcover): Wen Tong, Peiying Zhu 6G: The Next Horizon - From Connected People and Things to Connected Intelligence (Hardcover)
Wen Tong, Peiying Zhu
R2,422 R2,249 Discovery Miles 22 490 Save R173 (7%) Ships in 12 - 17 working days

The first book on 6G wireless presents an overall vision for 6G - an era of intelligence-of-everything - with drivers, key capabilities, use cases, KPIs, and the technology innovations that will shape it. These innovations include immersive human-centric communication, sensing, localization, and imaging, connected machine learning and networked AI, Industry 4.0 and beyond with connected intelligence, smart cities and life, and the satellite mega-constellation for 3D full-Earth wireless coverage. Also covered are new air-interface and networking technologies, integrated sensing and communications, and integrated terrestrial and non-terrestrial networks. In addition, novel network architectures to enable network AI, user centric networks, native trustworthiness are discussed. Essential reading for researchers in academia and industry working on B5G wireless communications.

Mobile Microservices - Building Flexible Pervasive Applications (Hardcover): Nanxi Chen Mobile Microservices - Building Flexible Pervasive Applications (Hardcover)
Nanxi Chen
R1,960 Discovery Miles 19 600 Ships in 12 - 17 working days

In the 5G era, edge computing and new ecosystems of mobile microservices enable new business models, strategies, and competitive advantage. Focusing on microservices, this book introduces the essential concepts, technologies, and trade-offs in the edge computing architectural stack, providing for widespread adoption and dissemination. The book elucidates the concepts, architectures, well-defined building blocks, and prototypes for mobile microservice platforms and pervasive application development, as well as the implementation and configuration of service middleware and AI-based microservices. A goal-oriented service composition model is then proposed by the author, allowing for an economic assessment of connected, smart mobile services. Based on this model, costs can be minimized through statistical workload aggregation effects or backhaul data transport reduction, and customer experience and safety can be enhanced through reduced response times. This title will be a useful guide for students and IT professionals to get started with microservices and when studying the use of microservices in pervasive applications. It will also appeal to researchers and students studying software architecture and service-oriented computing, and especially those interested in edge computing, pervasive computing, the Internet of Things, and mobile microservices.

Application Security in the ISO 27001 - 2013 Environment (Paperback, 2nd Two ed.): Vinod Vasudevan Application Security in the ISO 27001 - 2013 Environment (Paperback, 2nd Two ed.)
Vinod Vasudevan
R1,040 Discovery Miles 10 400 Ships in 12 - 17 working days
Signals and Systems - A Primer with MATLAB (R) (Paperback): Matthew N.O Sadiku, Warsame Hassan Ali Signals and Systems - A Primer with MATLAB (R) (Paperback)
Matthew N.O Sadiku, Warsame Hassan Ali
R1,434 Discovery Miles 14 340 Ships in 9 - 15 working days

Signals and Systems: A Primer with MATLAB (R) provides clear, interesting, and easy-to-understand coverage of continuous-time and discrete-time signals and systems. Each chapter opens with a historical profile or career talk, followed by an introduction that states the chapter objectives and links the chapter to the previous ones. All principles are presented in a lucid, logical, step-by-step approach. As much as possible, the authors avoid wordiness and detail overload that could hide concepts and impede understanding. In recognition of the requirements by the Accreditation Board for Engineering and Technology (ABET) on integrating computer tools, the use of MATLAB (R) is encouraged in a student-friendly manner. MATLAB is introduced in Appendix B and applied gradually throughout the book. Each illustrative example is immediately followed by a practice problem along with its answer. Students can follow the example step by step to solve the practice problem without flipping pages or looking at the end of the book for answers. These practice problems test students' comprehension and reinforce key concepts before moving on to the next section. Toward the end of each chapter, the authors discuss some application aspects of the concepts covered in the chapter. The material covered in the chapter is applied to at least one or two practical problems or devices. This helps students see how the concepts are applied to real-life situations. In addition, thoroughly worked examples are given liberally at the end of every section. These examples give students a solid grasp of the solutions as well as the confidence to solve similar problems themselves. Some of the problems are solved in two or three ways to facilitate a deeper understanding and comparison of different approaches. Ten review questions in the form of multiple-choice objective items are provided at the end of each chapter with answers. The review questions are intended to cover the "little tricks" that the examples and end-of-chapter problems may not cover. They serve as a self-test device and help students determine chapter mastery. Each chapter also ends with a summary of key points and formulas. Designed for a three-hour semester course on signals and systems, Signals and Systems: A Primer with MATLAB (R) is intended as a textbook for junior-level undergraduate students in electrical and computer engineering. The prerequisites for a course based on this book are knowledge of standard mathematics (including calculus and differential equations) and electric circuit analysis.

Cybercrime and Cybersecurity in the Global South - Concepts, Strategies and Frameworks for Greater Resilience (Hardcover):... Cybercrime and Cybersecurity in the Global South - Concepts, Strategies and Frameworks for Greater Resilience (Hardcover)
Charlette Donalds, Corlane Barclay, Kweku-Muata Osei-Bryson
R3,197 Discovery Miles 31 970 Ships in 12 - 17 working days

The Global South is recognized as one of the fastest growing regions in terms of Internet population as well as the region that accounts for the majority of Internet users. However, It cannot be overlooked that with increasing connectivity to and dependence on Internet-based platforms and services, so too is the potential increased for information and cybersecurity threats and attacks. Further, it has long been established that micro, small, and medium enterprises (MSMEs) play a key role in national economies, serving as important drivers of economic growth in Global South economies. Yet, little is known about information security, cybersecurity and cybercrime issues and strategies contextualized to these developing economies and MSMEs. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience examines the prevalence, nature, trends and impacts of cyber-related incidents on Global South economies. It further explores cybersecurity challenges, potential threats, and risks likely faced by MSMEs and governments of the Global South. A major thrust of this book is to offer tools, techniques, and legislative frameworks that can improve the information, data, and cybersecurity posture of Global South governments and MSMEs. It also provides evidence-based best practices and strategies relevant to the business community and general Information Communication Technology (ICT) users in combating and preventing cyber-related incidents. Also examined in this book are case studies and experiences of the Global South economies that can be used to enhance students' learning experience. Another important feature of this book is that it outlines a research agenda to advance the scholarship of information and cybersecurity in the Global South. Features: Cybercrime in the Caribbean Privacy and security management Cybersecurity compliance behaviour Developing solutions for managing cybersecurity risks Designing an effective cybersecurity programme in the organization for improved resilience The cybersecurity capability maturity model for sustainable security advantage Cyber hygiene practices for MSMEs A cybercrime classification ontology

Blockchain-enabled Fog and Edge Computing - Concepts, Architectures, and Applications (Paperback): Muhammad Maaz Rehan,... Blockchain-enabled Fog and Edge Computing - Concepts, Architectures, and Applications (Paperback)
Muhammad Maaz Rehan, Mubashir Husain Rehmani
R1,239 Discovery Miles 12 390 Ships in 12 - 17 working days

This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also understand their co-existence and their collaborative power to solve a range of versatile problems. The first part of the book covers fundamental concepts and the applications of blockchain-enabled fog and edge computing. These include: Internet of Things, Tactile Internet, Smart City; and E-challan in the Internet of Vehicles. The second part of the book covers security and privacy related issues of blockchain-enabled fog and edge computing. These include, hardware primitive based Physical Unclonable Functions; Secure Management Systems; security of Edge and Cloud in the presence of blockchain; secure storage in fog using blockchain; and using differential privacy for edge-based Smart Grid over blockchain. This book is written for students, computer scientists, researchers and developers, who wish to work in the domain of blockchain and fog/edge computing. One of the unique features of this book is highlighting the issues, challenges, and future research directions associated with Blockchain-enabled fog and edge computing paradigm. We hope the readers will consider this book a valuable addition in the domain of Blockchain and fog/edge computing.

Making Data Work - Enabling Digital Transformation, Empowering People and Advancing Organisational Success (Hardcover): Edosa... Making Data Work - Enabling Digital Transformation, Empowering People and Advancing Organisational Success (Hardcover)
Edosa Odaro
R3,485 Discovery Miles 34 850 Ships in 12 - 17 working days

In this book, Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption-fear. Fear of the unknown, fear of the intangible, fear of the investment needed and, yes, fear of losing your job to a machine. With his talent for distilling clarity from complexity, Edosa tackles this and many other challenges. -Tim Carmichael, Chief Data Officer, Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data, information and knowledge across organisations. Yet, rather than being stuck with endless polarising debates such as breaking down silos, it shifts focus back towards the ultimate "to what end." -Jacky Wright, Chief Digital Officer (CDO), Microsoft US If you care about AI transformation, empowering people or advancing organisational success in an increasingly digital world, then you should read this book. -Yomi Ibosiola, Chief Data and Analytics Officer, Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when-at the end of a critical investment in an artificial intelligence project that had been meant to save money-it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer's production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to "make data work" for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation, empower people, and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes, where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities.

OSPF and IS-IS - From Link State Routing Principles to Technologies (Hardcover): Rui Valadas OSPF and IS-IS - From Link State Routing Principles to Technologies (Hardcover)
Rui Valadas
R3,856 Discovery Miles 38 560 Ships in 9 - 15 working days

This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies makes the learning process easier and more solid. Moreover, it helps uncovering the dissimilarities and commonalities of OSPF and IS-IS and exposing their stronger and weaker features. The chapters on principles explain the features of LSR protocols and discuss the alternative design options, independently of technologies. The chapters on technologies provide a comprehensive description of OSPF and IS-IS with enough detail for professionals that need to work with these technologies. The final part of the book describes and discusses a large set of experiments with Cisco routers designed to illustrate the various features of OSPF and IS-IS. In particular, the experiments related to the synchronization mechanisms are not usually found in the literature.

Virtualization Security - Protecting Virtualized Environments (Paperback): D Shackleford Virtualization Security - Protecting Virtualized Environments (Paperback)
D Shackleford
R1,190 R922 Discovery Miles 9 220 Save R268 (23%) Ships in 7 - 13 working days

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches Offers effective practices for securing virtual machines without creating additional operational overhead for administrators Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.

Two-Factor Authentication (Paperback): Mark Stanislav Two-Factor Authentication (Paperback)
Mark Stanislav; Edited by It Governance Publishing
R471 Discovery Miles 4 710 Ships in 12 - 17 working days

Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.

Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover): Ishaani Priyadarshini, Chase Cotton Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover)
Ishaani Priyadarshini, Chase Cotton
R3,753 Discovery Miles 37 530 Ships in 12 - 17 working days

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well-its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover): Gizem Ozbayrac Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover)
Gizem Ozbayrac
R3,468 Discovery Miles 34 680 Ships in 12 - 17 working days

Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.

Digital Health Transformation with Blockchain and Artificial Intelligence (Hardcover): Chinmay Chakraborty Digital Health Transformation with Blockchain and Artificial Intelligence (Hardcover)
Chinmay Chakraborty
R3,347 Discovery Miles 33 470 Ships in 12 - 17 working days

The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector. The population has been overcoming the COVID-19 period; therefore, we need to establish intelligent digital healthcare systems using various emerging technologies like Blockchain and Artificial Intelligence. Internet of Medical Things is the technological revolution that has included the element of "smartness" in the healthcare industry and also identifying, monitoring, and informing service providers about the patient's clinical information with faster delivery of care services. This book highlights the important issues i.e. (a) How Internet of things can be integrated with the healthcare ecosystem for better diagnostics, monitoring, and treatment of the patients, (b) Artificial Intelligence for predictive and preventive healthcare systems, (c) Blockchain for managing healthcare data to provide transparency, security, and distributed storage, and (d) Effective remote diagnostics and telemedicine approach for developing smart care. The book encompasses chapters belong to the blockchain, Artificial Intelligence, and Big health data technologies. Features: Blockchain and internet of things in healthcare systems Secure Digital Health Data Management in Internet of Things Public Perception towards AI-Driven Healthcare Security, privacy issues and challenges in adoption of smart digital healthcare Big data analytics and Internet of things in the pandemic era Clinical challenges for digital health revolution Artificial intelligence for advanced healthcare Future Trajectory of Healthcare with Artificial Intelligence 9 Parkinson disease pre-diagnosis using smart technologies Emerging technologies to combat the COVID-19 Machine Learning and Internet of Things in Digital Health Transformation Effective Remote Healthcare and Telemedicine Approaches Legal implication of blockchain technology in public health This Book on "Digital Health Transformation with Blockchain and Artificial Intelligence" aims at promoting and facilitating exchanges of research knowledge and findings across different disciplines on the design and investigation of secured healthcare data analytics. It can also be used as a textbook for a Masters course in security and biomedical engineering. This book will also present new methods for the medical data analytics, blockchain technology, and diagnosis of different diseases to improve the quality of life in general, and better integration into digital healthcare.

Build a Security Culture (Paperback): Kai Roer Build a Security Culture (Paperback)
Kai Roer; Edited by It Governance Publishing
R420 Discovery Miles 4 200 Ships in 12 - 17 working days

Protect your organisation by building a security-minded culture "With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a firm basis on which to build an effective cyber security training programme." Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Washington, D.C. Human nature - easy prey for hackers? Human behaviour is complex and inconsistent, making it a rich hunting ground for would-be hackers and a significant risk to the security of your organisation . An effective way to address this risk is to create a culture of security. Using the psychology of group behaviour and explaining how and why people follow social and cultural norms, the author highlights the underlying cause for many successful and easily preventable attacks. An effective framework for behavioural security In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour . He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities. Contents What is security culture? The Elements of security culture How does security culture relate to security awareness? Asking for help raises your chances of success The psychology of groups and how to use it to your benefit Measuring culture Building security culture About the author Kai Roer is a management and security consultant and trainer with extensive international experience from more than 30 countries around the world. He is a guest lecturer at several universities, and the founder of The Roer Group, a European management consulting group focusing on security culture. Kai has authored a number of books on leadership and cyber security , has been published extensively in print and online, has appeared on radio and television, and has featured in printed media. He is a columnist at Help Net Security and has been the Cloud Security Alliance Norway chapter president since 2012. Kai is a passionate public speaker who engages his audience with his entertaining style and deep knowledge of human behaviours , psychology and cyber security . He is a Fellow of the National Cybersecurity Institute and runs a blog on information security and culture (roer.com). Kai is the host of Security Culture TV, a monthly video and podcast. Series information Build a Security Culture is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.

Advanced Penetration Testing - Hacking the World's Most Secure Networks (Paperback): W Allsopp Advanced Penetration Testing - Hacking the World's Most Secure Networks (Paperback)
W Allsopp
R1,275 R867 Discovery Miles 8 670 Save R408 (32%) Ships in 12 - 17 working days

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data even from organizations without a direct Internet connection this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level and this book shows you how to defend your high security network. * Use targeted social engineering pretexts to create the initial compromise * Leave a command and control structure in place for long-term access * Escalate privilege and breach networks, operating systems, and trust structures * Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Hardcover): Yves Caseau The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Hardcover)
Yves Caseau
R3,335 Discovery Miles 33 350 Ships in 12 - 17 working days

The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly "customer-centric", from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation - called "exponential information system" to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software "micro-factories" that produce service platforms, which are called "Lean software factories." This "software factory" concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the "lean approach to digital transformation" because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation.

Authorization and Access Control - Foundations, Frameworks, and Applications (Hardcover): Parikshit N. Mahalle, Shashikant S.... Authorization and Access Control - Foundations, Frameworks, and Applications (Hardcover)
Parikshit N. Mahalle, Shashikant S. Bhong, Gitanjali R. Shinde
R1,513 Discovery Miles 15 130 Ships in 12 - 17 working days

Provides overview of security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms Discusses behavioural analysis of threats and attacks using UML base modelling Covers use of Oauth2.0 Protocol and UMA for connecting web applications Includes Role Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Permission Based Access Control (PBAC) Explores how to provide access to third party web applications through resource server by use of secured and reliable Oauth2.0 framework

Cyber-Physical Systems and Industry 4.0 - Practical Applications and Security Management (Hardcover): Dinesh Goyal, Shanmugam... Cyber-Physical Systems and Industry 4.0 - Practical Applications and Security Management (Hardcover)
Dinesh Goyal, Shanmugam Balamurugan, Karthikrajan Senthilnathan, Iyswarya Annapoorani, Mohammad Israr
R3,515 Discovery Miles 35 150 Ships in 12 - 17 working days

The book provides a broad outlook on the applications of cyber-physical systems along with case studies and examples in healthcare, automotive electronics, industrial automation, environment monitoring, agriculture, and applications in civil and mechanical sectors. Topics include using an energy management system in smart grids, implementing an intelligent traffic management system, warehouse tracking and monitoring, medical cyber-physical systems security, remote healthcare monitoring, and more.

The Security Hippie (Hardcover): Barak Engel The Security Hippie (Hardcover)
Barak Engel
R3,179 Discovery Miles 31 790 Ships in 12 - 17 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Computer Security 3e (Paperback, 3rd Edition): D. Gollmann Computer Security 3e (Paperback, 3rd Edition)
D. Gollmann
R1,370 R1,227 Discovery Miles 12 270 Save R143 (10%) Ships in 7 - 13 working days

A completely up-to-date resource on computer security

Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another.Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer securityExamines the foundations of computer security and its basic principlesAddresses username and password, password protection, single sign-on, and moreDiscusses operating system integrity, hardware security features, and memoryCovers Unix security, Windows security, database security, network security, web security, and software security

Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.

Practical Security for Agile and DevOps (Hardcover): Mark S. Merkow Practical Security for Agile and DevOps (Hardcover)
Mark S. Merkow
R4,797 Discovery Miles 47 970 Ships in 12 - 17 working days

This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
How I Rob Banks - And Other Such Places
F. C. Barker Hardcover R449 Discovery Miles 4 490
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R1,171 R832 Discovery Miles 8 320
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,305 R1,172 Discovery Miles 11 720
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
AWS Certified Security Study Guide…
Santana Paperback R1,422 R1,088 Discovery Miles 10 880
Building Microservices
Sam Newman Paperback R1,212 Discovery Miles 12 120
Cisco CyberOps Associate CBROPS 200-201…
Omar Santos Hardcover R1,368 Discovery Miles 13 680
The Gathering Cloud
J. R. Carpenter Paperback R378 Discovery Miles 3 780
Securing Remote Access in Palo Alto…
Tom Piens Paperback R1,273 Discovery Miles 12 730
8 Steps to Better Security - A Simple…
K Crawley Paperback R524 Discovery Miles 5 240

 

Partners