0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (334)
  • R250 - R500 (886)
  • R500+ (13,956)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Mobility Data Management and Exploration (Hardcover, 2014 ed.): Nikos Pelekis, Yannis Theodoridis Mobility Data Management and Exploration (Hardcover, 2014 ed.)
Nikos Pelekis, Yannis Theodoridis
R2,145 R2,028 Discovery Miles 20 280 Save R117 (5%) Ships in 12 - 17 working days

This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications. It presents a step-by-step methodology to understand and exploit mobility data: collecting and cleansing data, storage in Moving Object Database (MOD) engines, indexing, processing, analyzing and mining mobility data. Emerging issues, such as semantic and privacy-aware querying and mining as well as distributed data processing, are also covered. Theoretical presentation is smoothly interchanged with hands-on exercises and case studies involving an actual MOD engine. The authors are established experts who address both theoretical and practical dimensions of the field but also present valuable prototype software. The background context, clear explanations and sample exercises make this an ideal textbook for graduate students studying database management, data mining and geographic information systems.

The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback): Stephen D Gantz The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback)
Stephen D Gantz
R864 Discovery Miles 8 640 Ships in 12 - 17 working days

"The Basics of IT Audit: Purposes, Processes, and Practical Information" provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.

IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements.

This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
Provides a concise treatment of IT auditing, allowing you to prepare for, participate in, and respond to the resultsDiscusses the pros and cons of doing internal and external IT audits, including the benefits and potential drawbacks of eachCovers the basics of complex regulations and standards, such as Sarbanes-Oxley, SEC (public companies), HIPAA, and FFIECIncludes most methods and frameworks, including GAAS, COSO, COBIT, ITIL, ISO (27000), and FISCAM

Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 1 (Hardcover): Information Reso... Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, VOL 1 (Hardcover)
Information Reso Management Association
R10,849 Discovery Miles 108 490 Ships in 10 - 15 working days
Computer and Computing Technologies in Agriculture X - 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China,... Computer and Computing Technologies in Agriculture X - 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China, October 19-21, 2016, Proceedings (Hardcover, 1st ed. 2019)
Daoliang Li
R3,035 Discovery Miles 30 350 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.

Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture,... Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) (Hardcover)
Benjamin Walker
R635 R545 Discovery Miles 5 450 Save R90 (14%) Ships in 10 - 15 working days
Network Convergence - Ethernet Applications and Next Generation Packet Transport Architectures (Paperback): Vinod Joseph,... Network Convergence - Ethernet Applications and Next Generation Packet Transport Architectures (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,380 Discovery Miles 13 800 Ships in 12 - 17 working days

"Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures" provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments.

This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture.

If you're a network designer or architect, a technical sales professional, or if you're pursuing technical certifications, you will benefit from "Network Convergence"'s fundamental information on this rapidly evolving technology.
Discusses architectural nuances and includes practical case studies for deploying the next-generation framework for each service type Explains data center and cloud computing interconnect schemes for building next-generation cloud infrastructures that support a new array of requirements Provides configuration schemes from leading vendors, including Cisco, Juniper and Alcatel

Network Science and Cybersecurity (Hardcover, 2014 ed.): Robinson E. Pino Network Science and Cybersecurity (Hardcover, 2014 ed.)
Robinson E. Pino
R4,382 R2,005 Discovery Miles 20 050 Save R2,377 (54%) Ships in 12 - 17 working days

"Network Science and Cybersecurity" introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.

This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .

Web Mobile-based Applications for Healthcare Management (Hardcover, New): Latif Al-Hakim Web Mobile-based Applications for Healthcare Management (Hardcover, New)
Latif Al-Hakim
R2,691 Discovery Miles 26 910 Ships in 12 - 17 working days

Healthcare organizations are constantly designing effective systems aiming to help achieve customer satisfaction. Web-based and mobile-based technologies are two forms of information technologies that healthcare executives are increasingly looking to merge as an opportunity to develop such systems. ""Web Mobile-Based Applications for Healthcare Management"" addresses the difficult task of managing admissions and waiting lists while ensuring a quick and convincing response to unanticipated changes of the clinical needs. ""Web Mobile-Based Applications for Healthcare Management"" tackles the limitations of traditional systems, and takes into consideration the dynamic nature of clinical needs, scarce resources, alternative strategies, and customer satisfaction in an environment that often imposes unexpected deviation from planned activities.

Unified Communications Forensics - Anatomy of Common UC Attacks (Paperback, New): Nicholas MR Grant, Joseph II Shaw Unified Communications Forensics - Anatomy of Common UC Attacks (Paperback, New)
Nicholas MR Grant, Joseph II Shaw
R1,042 R986 Discovery Miles 9 860 Save R56 (5%) Ships in 12 - 17 working days

"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

analysis of forensic artifacts in common UC attacks

an in-depth look at established UC technologies and attack exploits

hands-on understanding of UC attack vectors and associated countermeasures

companion website http: //secvoip.comgiving readers access to the most up-to-date information on UC attacks.

Provides key information for hackers and pen testers on the most current Unified Communications implementations.

The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.

Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "

Social Networks: A Framework of Computational Intelligence (Hardcover, 2014): Witold Pedrycz, Shyi-Ming Chen Social Networks: A Framework of Computational Intelligence (Hardcover, 2014)
Witold Pedrycz, Shyi-Ming Chen
R5,039 Discovery Miles 50 390 Ships in 12 - 17 working days

This volume provides the audience with an updated, in-depth and highly coherent material on the conceptually appealing and practically sound information technology of Computational Intelligence applied to the analysis, synthesis and evaluation of social networks. The volume involves studies devoted to key issues of social networks including community structure detection in networks, online social networks, knowledge growth and evaluation, and diversity of collaboration mechanisms. The book engages a wealth of methods of Computational Intelligence along with well-known techniques of linear programming, Formal Concept Analysis, machine learning, and agent modeling. Human-centricity is of paramount relevance and this facet manifests in many ways including personalized semantics, trust metric, and personal knowledge management; just to highlight a few of these aspects. The contributors to this volume report on various essential applications including cyber attacks detection, building enterprise social networks, business intelligence and forming collaboration schemes.

Given the subject area, this book is aimed at a broad audience of researchers and practitioners. Owing to the nature of the material being covered and a way it is organized, the volume will appeal to the well-established communities including those active in various disciplines in which social networks, their analysis and optimization are of genuine relevance. Those involved in operations research, management, various branches of engineering, and economics will benefit from the exposure to the subject matter.

Security of Cyber-Physical Systems - Vulnerability and Impact (Hardcover, 1st ed. 2020): Hadis Karimipour, Pirathayini... Security of Cyber-Physical Systems - Vulnerability and Impact (Hardcover, 1st ed. 2020)
Hadis Karimipour, Pirathayini Srikantha, Hany Farag, Jin Wei-Kocsis
R5,155 Discovery Miles 51 550 Ships in 12 - 17 working days

This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today's technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.

Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover): Heinz-Gerd... Integrated Management of Networked Systems - Concepts, Architectures and their Operational Application (Hardcover)
Heinz-Gerd Hegering, Sebastian Abeck, Bernhard Neumair
R3,376 Discovery Miles 33 760 Ships in 12 - 17 working days

""This is a comprehensive book covering architecture, implementation, and operational use of all the current approaches to management-OSI/TMN, SNMP, CORBA, DMTF, and Web-based. It not only covers most of the modern approaches to management but also includes interoperation between these approaches and the use of stand-alone tools such as protocol analyzers. It will be very useful as a reference book for students, researchers, and industry practitioners.""

-Professor Morris Sloman, Department of Computing, Imperial College of Science Technology and Medicine

""A comprehensive reference on the management of networked systems, this book is a must-have for any network or management system architect and anybody else in need of a deep understanding of network management technologies, tools, and practices. Professor Hegering and his team present a complete analysis of integrated network management architectures, tools, system development, and operational use.""

-Branislav Meandzija, General Instrument Corporation

""Highly respected experts Hegering, Abeck, and Neumair offer the most comprehensive presentation of systems and network management that I've seen to date. This book provides an excellent foundation of traditional and emergent technologies that every student and industry practitioner should read.""

-Lisa Phifer, Vice President, Core Competence, Inc.

Features
Teaches the enduring principles at work in a holistic, integrated approach to systems management.
Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

* Teaches the enduring principles at work in a holistic, integrated approach to systems management.
* Covers SNMPv3, CORBA Version 2, DMI 2.0, and CIM 2.0, as well as Java- and Web-based management architectures.
* Presents the perspective of an IT service provider responsible for maintaining Quality of Service levels.
* Describes the functionality of management tools used in the real world-and expert advice on choosing one right for your organization.

Handbook of Research on Information Security and Assurance (Hardcover): Jatinder N.D. Gupta (The University of Alabama in... Handbook of Research on Information Security and Assurance (Hardcover)
Jatinder N.D. Gupta (The University of Alabama in Huntsville, USA), Sushil Sharma
R7,313 Discovery Miles 73 130 Ships in 12 - 17 working days

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.""The Handbook of Research on Information Security and Assurance"" offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by scholars in information science, this reference provides tools to combat the growing risk associated with technology.

Proceeding of the International Science and Technology Conference "FarEast on 2019" - October 2019, Vladivostok, Russian... Proceeding of the International Science and Technology Conference "FarEast on 2019" - October 2019, Vladivostok, Russian Federation, Far Eastern Federal University (Hardcover, 1st ed. 2020)
Denis B. Solovev, Viktor V. Savaley, Alexander T. Bekker, Valery I. Petukhov
R9,607 Discovery Miles 96 070 Ships in 12 - 17 working days

This book presents the proceedings of the International Science and Technology Conference "FarEastCon 2019," which took place on October 1-4, 2019, in Vladivostok, Russian Federation. The conference provided a platform for gathering expert opinions on projects and initiatives aimed at the implementation of far-sighted scientific research and development, and allowed current theoretical and practical advances to be shared with the broader research community. Featuring selected papers from the conference, this book will be of interest to experts in various fields whose work involves developing innovative solutions and increasing the efficiency of economic activities.

Defense Mechanisms, Volume 136 - Theoretical, Research and Clinical Perspectives (Hardcover, New): Uwe Hentschel, Gudmund... Defense Mechanisms, Volume 136 - Theoretical, Research and Clinical Perspectives (Hardcover, New)
Uwe Hentschel, Gudmund SMith, Juris G. Draguns, Wolfram Ehlers
R3,288 Discovery Miles 32 880 Ships in 12 - 17 working days

The book is focused on defense mechanisms as theoretical constructs as well as the possibilities of their empirical registration by different methods, and the application of these constructs in different fields of psychology with special regard to concurrent and predictive validity. It is argued that defense mechanisms are in many ways to be seen as integrative constructs, not necessarily restricted to psychoanalytic theory and that the potential fields of their application have a wide ranging scope, comprising many fields of psychology. Consequently empirical studies are presented from the fields of clinical and personality psychology, psychotherapy research and psychosomatic phenomena and diseases. Methodological questions have a heavy weight in most of these studies.
* Provides coverage of relevant literature
* Covers different fields of application
* Attempts an integration of the contstruct of defense mechanisms into mainstream psychology
* Provides explanations of the theoretical basis of the construct of defense mechanisms

IC-BCT 2019 - Proceedings of the International Conference on Blockchain Technology (Hardcover, 1st ed. 2020): Dhiren, Patel,... IC-BCT 2019 - Proceedings of the International Conference on Blockchain Technology (Hardcover, 1st ed. 2020)
Dhiren, Patel, Sukumar Nandi, B.K Mishra, Deven Shah, Chirag N. Modi, …
R2,952 Discovery Miles 29 520 Ships in 10 - 15 working days

This book presents articles from the International Conference on Blockchain Technology (IC-BCT) 2019, held in Mumbai, India, and highlights recent advances in the field. It brings together researchers and industry practitioners to show case their ideas linked to business case studies, and provides an opportunity for engineers, researchers, startups and professionals in the field of Blockchain technology to further collaboration.

Resilience Of Networked Infrastructure Systems, The: Analysis And Measurement (Hardcover): Mayada Omer Resilience Of Networked Infrastructure Systems, The: Analysis And Measurement (Hardcover)
Mayada Omer
R2,663 Discovery Miles 26 630 Ships in 12 - 17 working days

This volume elaborates on both the qualitative and quantitative aspects of resilience. Reviewing the literature exploring the concept of resilience in engineering, it discusses resilience in terms of the various definitions used, the methodologies proposed to characterize resilience, and the metrics put forward to quantify the resilience of specific service infrastructure systems. The review also identifies the key factors that contribute to organizational resilience. The concept of resilience is compared to other system properties such as reliability, robustness, flexibility and agility, by taking into consideration what systems are prepared against (types of failure), the causes of failure in systems (uncertainty), and how systems react to overcome failure (level of adaptability). A review is also provided of several resilience-enabling schemes, which improve resilience by reducing vulnerability and increasing adaptive capacity. The book puts forward a new framework, the Networked Infrastructure Resilience Assessment (NIRA) framework, through which the resilience of systems can be measured by assessing the impact of disruptions on key performance measures. By applying the framework to various case studies, the book demonstrates the ability of the proposed framework to assess resilience across a wide variety of networked infrastructure systems. The case studies probe the resilience of the following critical infrastructure systems in the face of specific disruptive events: telecommunication, transportation, maritime transportation and organizational networks. This text is intended for all levels of academia from undergraduate through to research level as well as professionals and decision-makers involved in the development, analysis and evaluation of infrastructure systems.

FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed): Laura P Taylor FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed)
Laura P Taylor
R1,529 Discovery Miles 15 290 Ships in 12 - 17 working days

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.

Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. "

FISMA Compliance Handbook Second Edition, "also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
Includes new information on cloud computing compliance from Laura Taylor, the federal government s technical lead for FedRAMP

Includes coverage for both corporate and government IT managers

Learn how to prepare for, perform, and document FISMA compliance projects

This book is used by various colleges and universities in information security and MBA curriculums. "

Information Protection Playbook (Paperback): Greg Kane, Lorna Koppel Information Protection Playbook (Paperback)
Greg Kane, Lorna Koppel
R1,495 Discovery Miles 14 950 Ships in 12 - 17 working days

The primary" "goal of the" Information Protection Playbook" is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy.

Using the guidelines provided in the "Information Protection Playbook," security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.

The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.

The "Information Protection Playbook" is a part of Elsevier s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standardsDraws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive CouncilIncludes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book"

Elastic Optical Networks - Architectures, Technologies, and Control (Hardcover, 1st ed. 2016): Victor Lopez, Luis Velasco Elastic Optical Networks - Architectures, Technologies, and Control (Hardcover, 1st ed. 2016)
Victor Lopez, Luis Velasco
R4,205 Discovery Miles 42 050 Ships in 12 - 17 working days

This book presents advances in the field of optical networks - specifically on research and applications in elastic optical networks (EON). The material reflects the authors' extensive research and industrial activities and includes contributions from preeminent researchers and practitioners in optical networking. The authors discuss the new research and applications that address the issue of increased bandwidth demand due to disruptive, high bandwidth applications, e.g., video and cloud applications. The book also discusses issues with traffic not only increasing but becoming much more dynamic, both in time and direction, and posits immediate, medium, and long-term solutions throughout the text. The book is intended to provide a reference for network architecture and planning, communication systems, and control and management approaches that are expected to steer the evolution of EONs.

Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018): Tsuyoshi Takagi,... Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R4,499 Discovery Miles 44 990 Ships in 12 - 17 working days

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.

Professional Penetration Testing - Creating and Learning in a Hacking Lab (Paperback, 2nd edition): Thomas Wilhelm Professional Penetration Testing - Creating and Learning in a Hacking Lab (Paperback, 2nd edition)
Thomas Wilhelm
R1,728 Discovery Miles 17 280 Ships in 12 - 17 working days

"Professional Penetration Testing "walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.

Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.

All disc-based content for this title is now available on the Web.

Find out how to turn hacking and pen testing skills into a professional career

Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers

Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business

Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Reforming European Data Protection Law (Hardcover, 2015 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert Reforming European Data Protection Law (Hardcover, 2015 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert
R4,584 R3,726 Discovery Miles 37 260 Save R858 (19%) Ships in 12 - 17 working days

This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016): Yulong Zou, Jia Zhu Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016)
Yulong Zou, Jia Zhu
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

Internetworking - Technological Foundations and Applications (Hardcover, 2013 ed.): Christoph Meinel, Harald Sack Internetworking - Technological Foundations and Applications (Hardcover, 2013 ed.)
Christoph Meinel, Harald Sack
R2,946 R1,702 Discovery Miles 17 020 Save R1,244 (42%) Ships in 12 - 17 working days

This book is supposed to serve as a comprehensive and instructive guide through the new world of digital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee. A wide range of WAN technologies are covered including contemporary high speed technologies like PDH and SDH up to high speed wireless WANs (WiMAX) and 4th generation wireless telephone networks LTE. Routing technologies conclude the treatment of the data link layer. Next, there is the Internet layer with the Internet protocol IP that establishes a virtual uniform network out of the net of heterogeneous networks. In detail, both versions, IPv4 as well as the successor IPv6 are covered in detail as well as ICMP, NDP, and Mobile IP. In the subsequent transport layer protocol functions are provided to offer a connection-oriented and reliable transport service on the basis of the simple and unreliable IP. The basic protocols TCP and UDP are introduced as well as NAT, the network address translation. Beside transport layer security protocols like SSL and TLS are presented. On the upmost application layer popular Internet application protocols are described like DNS, SMTP, PGP, (S)FTP, NFS, SSH, DHCP, SNMP, RTP, RTCP, RTSP, and World Wide Web.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R478 Discovery Miles 4 780
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,490 Discovery Miles 14 900
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,875 Discovery Miles 18 750
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,351 Discovery Miles 13 510
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,892 Discovery Miles 58 920
PCI Dss: A Pocket Guide
IT Governance Paperback R375 Discovery Miles 3 750
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990

 

Partners