0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (827)
  • R500+ (14,092)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Linux Command Line and Shell Scripting Bible, Fourth Edition (Paperback, 4th Edition): R. Blum Linux Command Line and Shell Scripting Bible, Fourth Edition (Paperback, 4th Edition)
R. Blum
R1,086 R1,001 Discovery Miles 10 010 Save R85 (8%) Ships in 12 - 19 working days

Advance your understanding of the Linux command line with this invaluable resource Linux Command Line and Shell Scripting Bible, 4th Edition is the newest installment in the indispensable series known to Linux developers all over the world. Packed with concrete strategies and practical tips, the latest edition includes brand-new content covering: Understanding the Shell Writing Simple Script Utilities Producing Database, Web & Email Scripts Creating Fun Little Shell Scripts Written by accomplished Linux professionals Christine Bresnahan and Richard Blum, Linux Command Line and Shell Scripting Bible, 4th Edition teaches readers the fundamentals and advanced topics necessary for a comprehensive understanding of shell scripting in Linux. The book is filled with real-world examples and usable scripts, helping readers navigate the challenging Linux environment with ease and convenience. The book is perfect for anyone who uses Linux at home or in the office and will quickly find a place on every Linux enthusiast's bookshelf.

Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R4,922 Discovery Miles 49 220 Ships in 12 - 19 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Ethical Impact of Technological Advancements and Applications in Society (Hardcover): Rocci Luppicini Ethical Impact of Technological Advancements and Applications in Society (Hardcover)
Rocci Luppicini
R5,359 Discovery Miles 53 590 Ships in 10 - 15 working days

In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer ethics, engineering ethics, and biotech ethics as well as nascent areas of research such as nanoethics, artificial morality, and neuroethics.

Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover): Tolga Soyata Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover)
Tolga Soyata
R5,302 Discovery Miles 53 020 Ships in 10 - 15 working days

Today's smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R935 R775 Discovery Miles 7 750 Save R160 (17%) Ships in 12 - 19 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover): Laurence... IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover)
Laurence Lock Lee
R4,533 Discovery Miles 45 330 Ships in 10 - 15 working days

The outsourcing of IT services over the past decade has triggered a need to reassess how IT governance and sourcing should be conducted. ""IT Governance in a Networked World: Multi-Sourcing Strategies and Social Capital for Corporate Computing"" provides theories concerning corporate social capital, intellectual capital, and social networks for academicians, practitioners, and field researchers. This book addresses relationship challenges in a world that is becoming increasingly networked, offering useful frameworks and practices for IT governance.

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R2,132 R1,485 Discovery Miles 14 850 Save R647 (30%) Ships in 12 - 19 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback): Fred Eady Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback)
Fred Eady
R1,767 Discovery Miles 17 670 Ships in 12 - 19 working days

Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices.
This practical reference guides readers through the wireless technology forest, giving them the knowledge, the hardware and the software necessary to design a wireless embedded device rapidly, inexpensively, and effectively. Using off-the-shelf microcontrollers from Microchip and Atmel, the author provides step-by-step instructions for designing the hardware and firmware for a fully operational wireless networking device. The book gives a thorough introduction to 802.11 technology and puts it into perspective against the other wireless standard options. Just enough theory and mathematics is provided to give the depth of understanding needed for practical design work.
The book thoroughly covers:
* Laptop wireless Ethernet card introduction and theory
*Introduction to CompactFlash-to-microcontroller interfacing
* Implementing the laptop wireless Ethernet card in an embedded environment
In addition, the book includes access to a companion website containing all of the code, schematics and programs necessary to implement embedded 802.11 wireless networking.
* Covers the hottest new embedded market area- wireless networking
* Shows designers how to save money and time by using microcontrollers in their embedded wireless designs instead of expensive, complex prefab boards
* Companion website accompanying book contains all the code, schematics and programs necessary to get started now

Transactions on Engineering Technologies - World Congress on Engineering 2019 (Hardcover, 1st ed. 2021): Sio-Iong Ao, L.... Transactions on Engineering Technologies - World Congress on Engineering 2019 (Hardcover, 1st ed. 2021)
Sio-Iong Ao, L. Engelman, Haeng-kon Kim
R4,369 Discovery Miles 43 690 Ships in 10 - 15 working days

This book contains a selection of research articles written by prominent researchers participating in The 27th World Congress on Engineering (WCE 2019) which was held in London, UK, July 3-5, 2019. Topics covered include engineering mathematics, electrical engineering, communications systems, computer science, chemical engineering, systems engineering, manufacturing engineering, and industrial applications. With contributions carefully chosen to represent the most cutting-edge research presented during the conference, the book contains some of the state of the art in engineering technologies and the physical sciences and their applications and serves as a useful reference for researchers and graduate students working in these fields.

Software Piracy Exposed (Paperback): Ron Honick Software Piracy Exposed (Paperback)
Ron Honick
R980 Discovery Miles 9 800 Ships in 12 - 19 working days

This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
* This book is about software piracy--what it is and how it's done
* This is the first book ever to describe how software is actually stolen and traded over the internet
* Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software

Handbook of Communications Security (Hardcover): F. Garzia Handbook of Communications Security (Hardcover)
F. Garzia
R8,692 Discovery Miles 86 920 Ships in 12 - 19 working days

Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or lost of information during communication can generate material and non material economic damages from both a personal and collective point of view. Giving the reader information relating to all aspects of communications security, this book begins at the base ideas and builds to reach the most advanced and updated concepts. The comprehensive coverage makes the book a one-stop reference for integrated system designers, telecommunication designers, system engineers, system analysts, security managers, technicians, intelligence personnel, security personnel, police, army, private investigators, scientists, graduate and postgraduate students and anyone that needs to communicate in a secure way.

Emerging Automation Techniques for the Future Internet (Hardcover): Mohamed Boucadair, Christian Jacquenet Emerging Automation Techniques for the Future Internet (Hardcover)
Mohamed Boucadair, Christian Jacquenet
R5,317 Discovery Miles 53 170 Ships in 10 - 15 working days

Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectivity services regardless of the nature of the networking environment. New architectures combine advanced forwarding and routing schemes, mobility features, and customer-adapted resource facilities used for operation and delivery of services. Emerging Automation Techniques for the Future Internet is a collection of innovative research on the methods and applications of new architectures for the planning, dynamic delivery, and operation of services with a particular focus on automated detection and mitigation of denial-of-service (DoS) attacks. While highlighting topics including policy enforcement, self-architectures, and automated networks, this book is ideally designed for engineers, IT consultants, professionals, researchers, academicians, and students seeking current research on techniques and structures used to enhance experience and services rendered.

Introduction to Data Systems - Building from Python (Hardcover, 1st ed. 2020): Thomas Bressoud, David White Introduction to Data Systems - Building from Python (Hardcover, 1st ed. 2020)
Thomas Bressoud, David White
R2,423 Discovery Miles 24 230 Ships in 12 - 19 working days

Encompassing a broad range of forms and sources of data, this textbook introduces data systems through a progressive presentation. Introduction to Data Systems covers data acquisition starting with local files, then progresses to data acquired from relational databases, from REST APIs and through web scraping. It teaches data forms/formats from tidy data to relationally defined sets of tables to hierarchical structure like XML and JSON using data models to convey the structure, operations, and constraints of each data form. The starting point of the book is a foundation in Python programming found in introductory computer science classes or short courses on the language, and so does not require prerequisites of data structures, algorithms, or other courses. This makes the material accessible to students early in their educational career and equips them with understanding and skills that can be applied in computer science, data science/data analytics, and information technology programs as well as for internships and research experiences. This book is accessible to a wide variety of students. By drawing together content normally spread across upper level computer science courses, it offers a single source providing the essentials for data science practitioners. In our increasingly data-centric world, students from all domains will benefit from the "data-aptitude" built by the material in this book.

Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture,... Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) (Hardcover)
Benjamin Walker
R619 R562 Discovery Miles 5 620 Save R57 (9%) Ships in 10 - 15 working days
Multimedia Transcoding in Mobile and Wireless Networks (Hardcover): Ashraf M. a. Ahmad, Ismail Khalil Ibrahim Multimedia Transcoding in Mobile and Wireless Networks (Hardcover)
Ashraf M. a. Ahmad, Ismail Khalil Ibrahim
R5,405 Discovery Miles 54 050 Ships in 10 - 15 working days

In recent years, the field of multimedia communication in wireless and mobile video has grown in attraction. As the number of networks, types of devices, and content representation formats increase, the need for multimedia transcoding in wireless and mobile networks intensifies in order to provide a seamless interaction between content creation and usage.""Multimedia Transcoding in Mobile and Wireless Networks"" addresses the transcoding of all multimedia elements, including video, audio and text, while addressing both practical and theoretical problems in the field. A must have resource for all stakeholders in mobile and wireless technologies, this book embodies state-of-the-art knowledge of transcoding as it is embedded in today's pioneering technologies and leading research.

Quality of Service Architectures for Wireless Networks - Performance Metrics and Management (Hardcover): Quality of Service Architectures for Wireless Networks - Performance Metrics and Management (Hardcover)
R5,130 Discovery Miles 51 300 Ships in 10 - 15 working days

Quality of service provides different priorities to different users to guarantee a certain level of performance to a data flow in accordance with requests from the Internet service provider policy. Quality of Service Architectures for Wireless Networks: Performance Metrics and Management presents a comprehensive collection of quality of service mechanisms for various access technologies and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.

Smart Assisted Living - Toward An Open Smart-Home Infrastructure (Hardcover, 1st ed. 2020): Feng Chen, Rebeca I.... Smart Assisted Living - Toward An Open Smart-Home Infrastructure (Hardcover, 1st ed. 2020)
Feng Chen, Rebeca I. Garcia-Betances, Liming Chen, Maria Fernanda Cabrera-Umpierrez, Chris Nugent
R3,658 Discovery Miles 36 580 Ships in 10 - 15 working days

Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure. This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems. This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.

Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia,... Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers (Hardcover, 1st ed. 2021)
Michael Friedewald, Stefan Schiffner, Stephan Krenn
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,203 Discovery Miles 12 030 Ships in 12 - 19 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Hardcover, 1st ed. 2021): Debahuti Mishra, Rajkumar... Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Hardcover, 1st ed. 2021)
Debahuti Mishra, Rajkumar Buyya, Prasant Mohapatra, Srikanta Patnaik
R5,779 Discovery Miles 57 790 Ships in 10 - 15 working days

This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.

Deep Biometrics (Hardcover, 1st ed. 2020): Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger Deep Biometrics (Hardcover, 1st ed. 2020)
Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
R3,651 Discovery Miles 36 510 Ships in 10 - 15 working days

This book highlights new advances in biometrics using deep learning toward deeper and wider background, deeming it "Deep Biometrics". The book aims to highlight recent developments in biometrics using semi-supervised and unsupervised methods such as Deep Neural Networks, Deep Stacked Autoencoder, Convolutional Neural Networks, Generative Adversary Networks, and so on. The contributors demonstrate the power of deep learning techniques in the emerging new areas such as privacy and security issues, cancellable biometrics, soft biometrics, smart cities, big biometric data, biometric banking, medical biometrics, healthcare biometrics, and biometric genetics, etc. The goal of this volume is to summarize the recent advances in using Deep Learning in the area of biometric security and privacy toward deeper and wider applications. Highlights the impact of deep learning over the field of biometrics in a wide area; Exploits the deeper and wider background of biometrics, such as privacy versus security, biometric big data, biometric genetics, and biometric diagnosis, etc.; Introduces new biometric applications such as biometric banking, internet of things, cloud computing, and medical biometrics.

Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback): Jason Deckard Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback)
Jason Deckard
R888 Discovery Miles 8 880 Ships in 12 - 19 working days

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.
Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
*Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows.
*None of the current-best selling software security books focus exclusively on buffer overflows.
*This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R2,716 R1,895 Discovery Miles 18 950 Save R821 (30%) Ships in 12 - 19 working days

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

Configuring NetScreen Firewalls (Paperback): Rob Cameron Configuring NetScreen Firewalls (Paperback)
Rob Cameron
R878 Discovery Miles 8 780 Ships in 12 - 19 working days

The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security Manager. This book offers novice users a complete opportunity to learn the NetScreen firewall appliance. Advanced users will find it a rich technical resource.
* NetScreen is the #2 best-selling firewall appliance in the world (behind only Cisco PIX) and there are no competing books.
* Covers the materials found on the NetScreen NCSA 5.0 exam.
* Syngress firewall books are consistent best-sellers with market-leading books on ISA Server, Cisco PIX, and Check Point Next Generation.

Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
R4,931 Discovery Miles 49 310 Ships in 12 - 19 working days

This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Digital Signal Processing and…
Dag Stranneby Paperback R1,454 Discovery Miles 14 540
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
Research Anthology on Architectures…
Information R Management Association Hardcover R13,695 Discovery Miles 136 950
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340

 

Partners