0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (875)
  • R500+ (13,609)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback): I.S. Dr. Amiri, M. R. K. Soltanian Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback)
I.S. Dr. Amiri, M. R. K. Soltanian
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,277 Discovery Miles 12 770 Ships in 10 - 15 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Randomly Deployed Wireless Sensor Networks (Paperback): XI Chen Randomly Deployed Wireless Sensor Networks (Paperback)
XI Chen
R3,004 Discovery Miles 30 040 Ships in 10 - 15 working days

Wireless sensor networks have a range of applications, including military uses and in environmental monitoring. When an area of interest is inaccessible by conventional means, such a network can be deployed in ways resulting in a random distribution of the sensors. Randomly Deployed Wireless Sensor Networks offers a probabilistic method to model and analyze these networks. The book considers the network design, coverage, target detection, localization and tracking of sensors in randomly deployed wireless networks, and proposes a stochastic model. It quantifies the relationship between parameters of the network and its performance, and puts forward a communication protocol. The title provides analyses and formulas, giving engineering insight into randomly deployed wireless sensor networks. Five chapters consider the analysis of coverage performance; working modes and scheduling mechanisms; the relationship between sensor behavior and network performance properties; probabilistic forwarding routing protocols; localization methods for multiple targets and target number estimation; and experiments on target localization and tracking with a Mica sensor system.

Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security... Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls (Paperback)
Tom Piens
R1,181 Discovery Miles 11 810 Ships in 18 - 22 working days

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback): Florian Skopik, Paul Dr. Smith Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback)
Florian Skopik, Paul Dr. Smith
R2,166 Discovery Miles 21 660 Ships in 10 - 15 working days

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles (Hardcover): Jordi Guijarro, Saber Mhiri,... Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles (Hardcover)
Jordi Guijarro, Saber Mhiri, You-Jun Choi
R3,116 Discovery Miles 31 160 Ships in 18 - 22 working days

The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors' firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians. Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions.

Computing in Communication Networks - From Theory to Practice (Paperback): Frank H. P. Fitzek, Fabrizio Granelli, Patrick... Computing in Communication Networks - From Theory to Practice (Paperback)
Frank H. P. Fitzek, Fabrizio Granelli, Patrick Seeling
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

Computing in Communication Networks: From Theory to Practice provides comprehensive details and practical implementation tactics on the novel concepts and enabling technologies at the core of the paradigm shift from store and forward (dumb) to compute and forward (intelligent) in future communication networks and systems. The book explains how to create virtualized large scale testbeds using well-established open source software, such as Mininet and Docker. It shows how and where to place disruptive techniques, such as machine learning, compressed sensing, or network coding in a newly built testbed. In addition, it presents a comprehensive overview of current standardization activities. Specific chapters explore upcoming communication networks that support verticals in transportation, industry, construction, agriculture, health care and energy grids, underlying concepts, such as network slicing and mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN, disruptive innovations, such as network coding, compressed sensing and machine learning, how to build a virtualized network infrastructure testbed on one's own computer, and more.

Integration and Implementation of the Internet of Things Through Cloud Computing (Hardcover): Pradeep Tomar Integration and Implementation of the Internet of Things Through Cloud Computing (Hardcover)
Pradeep Tomar
R6,648 Discovery Miles 66 480 Ships in 18 - 22 working days

The internet of things (IoT) has drawn great attention from both academia and industry, since it offers a challenging notion of creating a world where all things around us are connected to the internet and communicate with each other with minimal human intervention. Another component for helping IoT to succeed is cloud computing. The combination of cloud computing and IoT will enable new monitoring services and powerful processing of sensory data streams. These applications, alongside implementation details and challenges, should also be explored for successful mainstream adoption. IoT is also fueled by the advancement of digital technologies, and the next generation era will be cloud-based IoT systems. Integration and Implementation of the Internet of Things Through Cloud Computing studies, analyzes, and presents cloud-based IoT-related technologies, protocols, and standards along with recent research and development in cloud-based IoT. It also presents recent emerging trends and technological advances of cloud-based IoT, innovative applications, and the challenges and implications for society. The chapters included take a strong look at the societal and social aspects of this technology along with its implementations and technological analyses. This book is intended for IT specialists, technologists, practitioners, researchers, academicians, and students who are interested in the next era of IoT through cloud computing.

Internet of Things (IoT) for Automated and Smart Applications (Hardcover): Yasser Ismail Internet of Things (IoT) for Automated and Smart Applications (Hardcover)
Yasser Ismail
R3,068 Discovery Miles 30 680 Ships in 18 - 22 working days
Wearable Devices - the Big Wave of Innovation (Hardcover): Noushin Nasiri Wearable Devices - the Big Wave of Innovation (Hardcover)
Noushin Nasiri
R3,065 Discovery Miles 30 650 Ships in 18 - 22 working days
Cellular Internet of Things - From Massive Deployments to Critical 5G Applications (Paperback, 2nd edition): Olof Liberg,... Cellular Internet of Things - From Massive Deployments to Critical 5G Applications (Paperback, 2nd edition)
Olof Liberg, Marten Sundberg, Eric Wang, Johan Bergman, Joachim Sachs, …
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

Cellular Internet of Things: From Massive Deployments to Critical 5G Applications, Second Edition, gives insights into the recent and rapid work performed by the 3rd Generation Partnership Project (3GPP) and the Multefire Alliance (MFA) to develop systems for the Cellular IoT. Beyond the technologies, readers will learn what the mMTC and cMTC market segments look like, deployment options and expected performance in terms of system capacity, expected battery lifetime, data throughput, access delay time and device cost, regulations for operation in unlicensed frequency bands, and how they impact system design and performance. This new edition contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT features in 3GPP Release 15, critical communication, i.e. URLLC, specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT for unlicensed frequency bands specified in the Multefire Alliance (MFA), and an updated outlook of what the future holds in Industrial IoT and drone communications, amongst other topics.

Air Route Networks Through Complex Networks Theory (Paperback): Jose M Sallan, Oriol Lordan Air Route Networks Through Complex Networks Theory (Paperback)
Jose M Sallan, Oriol Lordan
R2,519 Discovery Miles 25 190 Ships in 10 - 15 working days

Air Route Networks through Complex Networks Theory connects theory research with network connectivity analysis, providing practitioners with the tools they need to develop more efficient, resilient and profitable air route networks. The book helps airline route planners and executives create more robust route networks that are less vulnerable to disruptions, such as node isolation. The book further explores errors and attacks in complex networks, strategies for detecting critical nodes and cascading failure models to assess and maximize robustness. The book explains how to measure air route network connectivity with complex network representations. Air transport is among the most dynamic and toughest competition industries in today's global economy. The quality of air route network design is a key strategic factor in an airline's viability. These robust networks provide for more stable and secure carrier operations vs. those based simply on existing supply and demand volumes. Node-specific and network-specific representations are covered, along with in-depth coverage of connectivity in special and temporal networks. These collective tools serve as a guide for practitioners seeking to apply complex network theory to the airline industry.

Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R7,311 Discovery Miles 73 110 Ships in 18 - 22 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback): Parisa Dr. Naraei,... Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback)
Parisa Dr. Naraei, I.S. Dr. Amiri, Iman Dr. Saberi
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.

Strategic Approaches to Digital Platform Security Assurance (Hardcover): Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves... Strategic Approaches to Digital Platform Security Assurance (Hardcover)
Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, Dennis Verslegers
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Nowadays it is impossible to imagine a business without technology as most industries are becoming ""smarter"" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and ""platform""-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.

Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,097 Discovery Miles 10 970 Ships in 18 - 22 working days
Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare (Hardcover): Ricardo Queiros, Bruno Cunha,... Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare (Hardcover)
Ricardo Queiros, Bruno Cunha, Xavier Fonseca
R10,580 Discovery Miles 105 800 Ships in 18 - 22 working days

Digital technologies are currently dramatically changing healthcare. Cloud healthcare is an increasingly trending topic in the field, converging skills from computer and health science. This new strategy fosters the management of health data at a large scale and makes it easier for healthcare organizations to improve patient experience and health team productivity while helping the support, security, compliance, and interoperability of health data. Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare is a reference in the ongoing digital transformation of the healthcare sector. It presents a comprehensive state-of-the-art approach to cloud internet of things health technologies and practices. It provides insights over strategies, methodologies, techniques, tools, and services based on emerging cloud digital health solutions to overcome digital health challenges. Covering topics such as auxiliary systems, the internet of medical things, and natural language processing, this premier reference source is an essential resource for medical professionals, hospital administrators, medical students, medical professors, libraries, researchers, and academicians.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover)
Information Reso Management Association
R8,951 Discovery Miles 89 510 Ships in 18 - 22 working days
Architecture and Security Issues in Fog Computing Applications (Hardcover): Sam Goundar, S. Bharath Bhushan, Praveen Kumar... Architecture and Security Issues in Fog Computing Applications (Hardcover)
Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani
R5,924 Discovery Miles 59 240 Ships in 18 - 22 working days

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.

Cloud Computing Applications and Techniques for E-Commerce (Hardcover): Saikat Gochhait, David Tawei Shou, Sabiha Fazalbhoy Cloud Computing Applications and Techniques for E-Commerce (Hardcover)
Saikat Gochhait, David Tawei Shou, Sabiha Fazalbhoy
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Many professional fields have been affected by the rapid growth of technology and information. Included in this are the business and management markets as the implementation of e-commerce and cloud computing have caused enterprises to make considerable changes to their practices. With the swift advancement of this technology, professionals need proper research that provides solutions to the various issues that come with data integration and shifting to a technology-driven environment. Cloud Computing Applications and Techniques for E-Commerce is an essential reference source that discusses the implementation of data and cloud technology within the fields of business and information management. Featuring research on topics such as content delivery networks, virtualization, and software resources, this book is ideally designed for managers, educators, administrators, researchers, computer scientists, business practitioners, economists, information analysists, sociologists, and students seeking coverage on the recent advancements of e-commerce using cloud computing techniques.

A Hacker, I Am (Hardcover): Craig Ford A Hacker, I Am (Hardcover)
Craig Ford
R892 R771 Discovery Miles 7 710 Save R121 (14%) Ships in 18 - 22 working days
Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations (Hardcover): Ana Pego Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations (Hardcover)
Ana Pego
R7,723 Discovery Miles 77 230 Ships in 18 - 22 working days

Businesses have had to face many challenges due to the COVID-19 pandemic; to survive in the changing landscape, they had to adapt quickly and implement new tactics and best practices to stay competitive. Networking is one of the many areas that looks vastly different in a post-pandemic world and companies must understand this change or risk falling behind. Further study is required to uncover the various difficulties and potential future directions of networking and innovation within the business landscape. The Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations provides a thorough overview of the ways in which organizations have had to change and adapt to the new business environments and considers how networking looks different in a post-COVID-19 world. Covering key topics such as organizational structures, consumer behavior, teleworking, and collaborations, this major reference work is ideal for managers, business owners, industry professionals, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R8,949 Discovery Miles 89 490 Ships in 18 - 22 working days
Securing Delay-Tolerant Networks with BPSec (Hardcover): Birrane Securing Delay-Tolerant Networks with BPSec (Hardcover)
Birrane
R3,133 Discovery Miles 31 330 Ships in 18 - 22 working days

Securing Delay-Tolerant Networks with BPSec One-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders Securing Delay-Tolerant Networks with BPSec answers the question, "How can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today?" The text is composed of three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in emerging network environments. The text includes pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. It also features a tutorial on how to achieve several important security outcomes with a combination of security protocols, BPSec included. Overall, it covers best practices for common security functions, clearly showing designers how to prevent network architecture from being over-constrained by traditional security approaches. Written by the lead author and originator of the BPSec protocol specification, Securing Delay-Tolerant Networks (DTNs) with BPSec includes information on: The gap between cryptography and network security, how security requirements constrain network architectures, and why we need something different DTN stressing conditions, covering intermittent connectivity, congested paths, partitioned topologies, limited link state, and multiple administrative controls Securing the terrestrial internet, involving a layered approach to security, the impact of protocol design on security services, and securing the internetworking and transport layers A delay-tolerant security architecture, including desirable properties of a DTN secure protocol, fine-grained security services, and protocol augmentation Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop reference on the subject for any professional operationally deploying BP who must use BPSec for its security, including software technical leads, software developers, space flight mission leaders, network operators, and technology and product development leaders in general.

Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover): Amit Kumar Tyagi Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover)
Amit Kumar Tyagi
R8,044 Discovery Miles 80 440 Ships in 18 - 22 working days

More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. It further explores select methods and algorithms of learning for implementing better security methods in fields such as business and healthcare. It recognizes the future of privacy and the importance of preserving data through recommended practice, feedback loops, and smart agents. Covering topics such as face mask detection, gesture recognition, and botnet attacks and detection, this major reference work is a dynamic resource for medical professionals, healthcare administrators, government officials, business executives and managers, IT managers, students and faculty of higher education, librarians, researchers, and academicians.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Real Alice in Wonderland - A Role…
C. M Rubin Hardcover  (1)
R831 R760 Discovery Miles 7 600
Remote Sensing of Land Use and Land…
Duo Chu Hardcover R3,120 Discovery Miles 31 200
Naked Project Management - The Bare…
Dennis Lock Paperback R1,482 Discovery Miles 14 820
Case Studies in Geospatial Applications…
Pravat Kumar Shit, Gouri Sankar Bhunia, … Paperback R3,237 Discovery Miles 32 370
Agile Approaches for Successfully…
Hur Bersam Bolat, Gul Tekin Temur Hardcover R5,811 Discovery Miles 58 110
Grotesque Relations - Modernist Domestic…
Susan Edmunds Hardcover R1,134 Discovery Miles 11 340
Tuning and Control Loop Performance
Gregory McMillan Paperback R2,424 R1,955 Discovery Miles 19 550
Beckett at 100 - Revolving it All
Linda Ben-Zvi, Angela Moorjani Hardcover R2,012 Discovery Miles 20 120
Fault Detection, Supervision and Safety…
J. Chen, R.J. Patton Paperback R6,901 Discovery Miles 69 010
Harnessing Value in the Supply Chain…
E Banfield Hardcover R4,022 Discovery Miles 40 220

 

Partners