0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (28)
  • R500+ (299)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and... Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation - 4th International Conference, ICC3 2019, Coimbatore, India, December 19-21, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Suresh Balusamy, Alexander N. Dudin, Manuel Grana, A. Kaja Mohideen, N. K. Sreelaja, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019. The 9 papers presented in this volume were carefully reviewed and selected from 38 submissions. They were organized in topical sections named: computational intelligence; cyber security; and computational models.

Deployable Machine Learning for Security Defense - First International Workshop, MLHat 2020, San Diego, CA, USA, August 24,... Deployable Machine Learning for Security Defense - First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings (Paperback, 1st ed. 2020)
Gang Wang, Arridhana Ciptadi, Ali Ahmadzadeh
R2,087 Discovery Miles 20 870 Ships in 18 - 22 working days

This book constitutes selected papers from the First International Workshop on Deployable Machine Learning for Security Defense, MLHat 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers were thoroughly reviewed and selected from 13 qualified submissions. The papers are organized in the following topical sections: understanding the adversaries; adversarial ML for better security; threats on networks.

Cybersecurity and Cyberwar - What Everyone Needs to Know (R) (Paperback): Peter W. Singer, Allan Friedman Cybersecurity and Cyberwar - What Everyone Needs to Know (R) (Paperback)
Peter W. Singer, Allan Friedman
R323 R295 Discovery Miles 2 950 Save R28 (9%) Ships in 9 - 17 working days

Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.

Cyberpunk - Outlaws and Hackers on the Computer Frontier (Paperback): Katie Hafner, John Markoff Cyberpunk - Outlaws and Hackers on the Computer Frontier (Paperback)
Katie Hafner, John Markoff
R561 Discovery Miles 5 610 Ships in 18 - 22 working days

Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak havoc on the information they find -- everything from bank accounts to military secrets. In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them.

Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised... Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers (Paperback, 1st ed. 2019)
Gilbert Peterson, Sujeet Shenoi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: forensic models, mobile and embedded device forensics, filesystem forensics, image forensics, and forensic techniques. This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of fourteen edited papers from the Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2019. Advances in Digital Forensics XV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Data Science in Cybersecurity and Cyberthreat Intelligence (Paperback, 1st ed. 2020): Leslie F Sikos, Kim-Kwang Raymond Choo Data Science in Cybersecurity and Cyberthreat Intelligence (Paperback, 1st ed. 2020)
Leslie F Sikos, Kim-Kwang Raymond Choo
R5,823 Discovery Miles 58 230 Ships in 18 - 22 working days

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.

The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback): Jasper van Woudenberg, Colin... The Hardware Hacking Handbook - Breaking Embedded Security with Hardware Attacks (Paperback)
Jasper van Woudenberg, Colin O'flynn
R992 R886 Discovery Miles 8 860 Save R106 (11%) Ships in 10 - 15 working days

The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.

Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linkoeping, Sweden, September... Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Linkoeping, Sweden, September 23-25, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Simin Nadjm-Tehrani
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the revised selected papers of the 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019, held in Linkoeping, Sweden, in September 2019.The 10 full papers and 5 short papers presented were carefully reviewed and selected from 30 submissions. They are grouped in the following topical sections: Invited Papers, Risk Management, Vulnerability Assessment, Resilience and Mitigation Short Papers, and Industry and Practical Experience Reports.

Deconstruction Machines - Writing in the Age of Cyberwar (Paperback): Justin Joque Deconstruction Machines - Writing in the Age of Cyberwar (Paperback)
Justin Joque; Foreword by Catherine Malabou
R655 R612 Discovery Miles 6 120 Save R43 (7%) Ships in 10 - 15 working days

A bold new theory of cyberwar argues that militarized hacking is best understood as a form of deconstruction From shadowy attempts to steal state secrets to the explosive destruction of Iranian centrifuges, cyberwar has been a vital part of statecraft for nearly thirty years. But although computer-based warfare has been with us for decades, it has changed dramatically since its emergence in the 1990s, and the pace of change is accelerating. In Deconstruction Machines, Justin Joque inquires into the fundamental nature of cyberwar through a detailed investigation of what happens at the crisis points when cybersecurity systems break down and reveal their internal contradictions. He concludes that cyberwar is best envisioned as a series of networks whose constantly shifting connections shape its very possibilities. He ultimately envisions cyberwar as a form of writing, advancing the innovative thesis that cyber attacks should be seen as a militarized form of deconstruction in which computer programs are systems that operate within the broader world of texts. Throughout, Joque addresses hot-button subjects such as technological social control and cyber-resistance entities like Anonymous and Wikileaks while also providing a rich, detailed history of cyberwar. Deconstruction Machines provides a necessary new interpretation of deconstruction and timely analysis of media, war, and technology.

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security... Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security (Paperback, 1st ed. 2019)
Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman
R1,634 Discovery Miles 16 340 Ships in 18 - 22 working days

Today's cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous functionalities but randomized manifestations. The 10 papers included in this State-of-the Art Survey present recent advances made by a large team of researchers working on the same US Department of Defense Multidisciplinary University Research Initiative (MURI) project during 2013-2019. This project has developed a new class of technologies called Adaptive Cyber Defense (ACD) by building on two active but heretofore separate research areas: Adaptation Techniques (AT) and Adversarial Reasoning (AR). AT methods introduce diversity and uncertainty into networks, applications, and hosts. AR combines machine learning, behavioral science, operations research, control theory, and game theory to address the goal of computing effective strategies in dynamic, adversarial environments.

Hybrid Artificial Intelligent Systems - 14th International Conference, HAIS 2019, Leon, Spain, September 4-6, 2019, Proceedings... Hybrid Artificial Intelligent Systems - 14th International Conference, HAIS 2019, Leon, Spain, September 4-6, 2019, Proceedings (Paperback, 1st ed. 2019)
Hilde Perez Garcia, Lidia Sanchez Gonzalez, Manuel Castejon Limas, Hector Quintian Pardo, Emilio Corchado Rodriguez
R1,542 Discovery Miles 15 420 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 14th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2019, held in Leon, Spain, in September 2019. The 64 full papers published in this volume were carefully reviewed and selected from 134 submissions. They are organized in the following topical sections: data mining, knowledge discovery and big data; bio-inspired models and evolutionary computation; learning algorithms; visual analysis and advanced data processing techniques; data mining applications; and hybrid intelligent applications.

Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg,... Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings (Paperback, 1st ed. 2019)
Roberto Perdisci, Clementine Maurice, Giorgio Giacinto, Magnus Almgren
R2,034 Discovery Miles 20 340 Ships in 18 - 22 working days

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R1,010 R685 Discovery Miles 6 850 Save R325 (32%) Ships in 10 - 15 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

Cyber Fraud - Tactics, Techniques and Procedures (Hardcover): Rick Howard Cyber Fraud - Tactics, Techniques and Procedures (Hardcover)
Rick Howard
R4,112 Discovery Miles 41 120 Ships in 10 - 15 working days

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy.

Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas.

This eye-opening work includes a variety of case studies including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network s (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7,... Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Sokratis K. Katsikas, Frederic Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Anton, …
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.

Ethical Hacking (Paperback): Alana Maurushat Ethical Hacking (Paperback)
Alana Maurushat
R874 Discovery Miles 8 740 Ships in 18 - 22 working days

How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto "we open governments" on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause-political or otherwise-which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La premiere moitie du XXIe siecle sera sans doute reconnue comme l'epoque ou le piratage ethique a ouvert de force les gouvernements, deplacant les limites de la transparence. La page twitter de Wikileaks enchasse cet ethos a meme sa devise, " we open governments ", et sa volonte d'etre omnipresent. En parallele, les grandes societes de technologie comme Apple se font competition pour produire des produits de plus en plus securitaires et a proteger les donnees de leurs clients, alors meme que les gouvernements tentent de limiter et de decrypter ces nouvelles technologies d'encryption. Entre-temps, le marche des vulnerabilites en matiere de securite augmente a mesure que les experts en securite informatique vendent des vulnerabilites de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 a 1,5 million de dollars. L'activisme en securite est a la hausse. Le piratage ethique est l'utilisation non-violence d'une technologie quelconque en soutien d'une cause politique ou autre qui est souvent ambigue d'un point de vue juridique et moral. Le hacking ethique peut designer les actes de verification de penetration professionnelle ou d'experts en securite informatique, de meme que d'autres formes d'actions emergentes, comme l'hacktivisme et la desobeissance civile en ligne. L'hacktivisme est une forme de piratage ethique, mais egalement une forme de militantisme des droits civils a l'ere numerique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertes fondamentales, y compris la liberte d'expression et a la vie privee, et la responsabilite des gouvernements d'etre ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antecedents comme les agendas des hacktivistes sont fort diversifies. Il n'est pas clair de quelle facon les tribunaux et les gouvernements traiteront des tentatives de piratage eu egard aux zones grises juridiques, aux approches ethiques conflictuelles, et compte tenu du fait qu'il n'existe actuellement, dans le monde, presque aucune exception aux provisions, en matiere de cybercrime et de crime informatique, liees a la recherche sur la securite ou l'interet public. Il sera egalement difficile de determiner le lien entre hacktivisme et droits civils. Ce livre est publie en anglais.

Hackers: Heroes of the Computer Revolution (Paperback, 25th Anniversary ed): Steven Levy Hackers: Heroes of the Computer Revolution (Paperback, 25th Anniversary ed)
Steven Levy
R717 R646 Discovery Miles 6 460 Save R71 (10%) Ships in 18 - 22 working days

Steven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly. Hackers traces the exploits of innovators from the research labs in the late 1950s to the rise of the home computer in the mid-1980s. It's a fascinating story of brilliant and eccentric nerds such as Steve Wozniak, Ken Williams, and John Draper who took risks, bent the rules, and took the world in a radical new direction. "Hacker" is often a derogatory term today, but 40 years ago, it referred to people who found clever and unorthodox solutions to computer engineering problems -- a practice that became known as "the hacker ethic." In this book, Levy takes you from the true hackers of MIT's Tech Model Railroad Club to the DIY culture that spawned the first personal computers -- the Altair and the Apple II -- and finally to the gaming culture of the early '80s. From students finagling access to clunky computer-card machines to engineers uncovering the secrets of what would become the Internet, Hackers captures a seminal period in history when underground activities blazed a trail for today's digital world. This book is not just for geeks -- it's for everyone interested in origins of the computer revolution.

Game Over Girl (Paperback): Naomi Gibson Game Over Girl (Paperback)
Naomi Gibson
R263 R240 Discovery Miles 2 400 Save R23 (9%) Ships in 9 - 17 working days

An edge-of-your-seat psychological thriller from the acclaimed author of Every Line of You - A Good Girl's Guide to Murder meets virtual reality ... 'A pacy, intelligent novel that will have readers racing to get to the final page.' THE BOOKSELLER 'A pixelated whirlwind of a ride through the darkest secrets of the human mind, explored through the lens of virtual reality gaming!' LEE NEWBERY, AUTHOR OF THE LAST FIREFOX Lola's been selected to play a new virtual reality game - Better Than Life. In her game, she's loved. Is beautiful. Can do whatever she wants. But she quickly breaks the one rule: not to recreate people or places from real life. She recreates her house and a boy she fancies. Soon she's skipping school to play. But Lola has secrets - dark ones that begin to surface inside her game - and the more she tries to fix her problems, the more she overlooks a much bigger threat ... An original, high-concept psychological thriller - Holly Jackson meets VR horror Set in an exclusive boarding school, this rollercoaster ride of a story involves an unreliable narrator,immersive gaming, a dark secret and a huge twist Perfect for fans of Cynthia Murphy and Kathryn Foxfield PRAISE FOR EVERY LINE OF YOU: 'What a debut. So tense - and it didn't lead where I thought it was going.' SUE WALLMAN, author of YOUR TURN TO DIE 'Frankenstein meets Heathers. Bonnie and Clyde for the digital age, Every Line of You is a gripping thriller about the power of AI and a fresh twist on the intensity of first love.' AMY MCCAW, author of MINA AND THE UNDEAD

Coding Freedom - The Ethics and Aesthetics of Hacking (Paperback): E. Gabriella Coleman Coding Freedom - The Ethics and Aesthetics of Hacking (Paperback)
E. Gabriella Coleman
R749 Discovery Miles 7 490 Ships in 10 - 15 working days

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software (F/OSS) movement in the United States and Europe, Coding Freedom details the ethics behind hackers' devotion to F/OSS, the social codes that guide its production, and the political struggles through which hackers question the scope and direction of copyright and patent law. In telling the story of the F/OSS movement, the book unfolds a broader narrative involving computing, the politics of access, and intellectual property.

E. Gabriella Coleman tracks the ways in which hackers collaborate and examines passionate manifestos, hacker humor, free software project governance, and festive hacker conferences. Looking at the ways that hackers sustain their productive freedom, Coleman shows that these activists, driven by a commitment to their work, reformulate key ideals including free speech, transparency, and meritocracy, and refuse restrictive intellectual protections. Coleman demonstrates how hacking, so often marginalized or misunderstood, sheds light on the continuing relevance of liberalism in online collaboration.

Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context (Paperback, 1st ed. 2022): Leonhard Kunczik Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context (Paperback, 1st ed. 2022)
Leonhard Kunczik
R2,061 R1,563 Discovery Miles 15 630 Save R498 (24%) Ships in 10 - 15 working days

This book explores the combination of Reinforcement Learning and Quantum Computing in the light of complex attacker-defender scenarios. Reinforcement Learning has proven its capabilities in different challenging optimization problems and is now an established method in Operations Research. However, complex attacker-defender scenarios have several characteristics that challenge Reinforcement Learning algorithms, requiring enormous computational power to obtain the optimal solution. The upcoming field of Quantum Computing is a promising path for solving computationally complex problems. Therefore, this work explores a hybrid quantum approach to policy gradient methods in Reinforcement Learning. It proposes a novel quantum REINFORCE algorithm that enhances its classical counterpart by Quantum Variational Circuits. The new algorithm is compared to classical algorithms regarding the convergence speed and memory usage on several attacker-defender scenarios with increasing complexity. In addition, to study its applicability on today's NISQ hardware, the algorithm is evaluated on IBM's quantum computers, which is accompanied by an in-depth analysis of the advantages of Quantum Reinforcement Learning.

How To Hack Like A Legend (Paperback): Sparc Flow How To Hack Like A Legend (Paperback)
Sparc Flow
R813 R691 Discovery Miles 6 910 Save R122 (15%) Ships in 9 - 17 working days

Step into the shoes of a master hacker as he breaks into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real-life weaknesses in today s advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft's best security systems.

Hacking - The Art Of Exploitation (Paperback, 2nd Revised edition): Jon Erickson Hacking - The Art Of Exploitation (Paperback, 2nd Revised edition)
Jon Erickson 1
R1,144 R973 Discovery Miles 9 730 Save R171 (15%) Ships in 18 - 22 working days

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, ex

IT Audit, Control, and Security (Hardcover, 2nd Ed): R Moeller IT Audit, Control, and Security (Hardcover, 2nd Ed)
R Moeller
R2,321 Discovery Miles 23 210 Ships in 10 - 15 working days

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the "IT Audit, Control, and Security" describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.

Cyber Fraud - Tactics, Techniques and Procedures (Paperback): Rick Howard Cyber Fraud - Tactics, Techniques and Procedures (Paperback)
Rick Howard
R1,900 Discovery Miles 19 000 Ships in 10 - 15 working days

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy. Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas. This eye-opening work includes a variety of case studies including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network's (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

Cybersecurity Awareness Among Students and Faculty (Hardcover): Abbas Moallem Cybersecurity Awareness Among Students and Faculty (Hardcover)
Abbas Moallem
R1,796 Discovery Miles 17 960 Ships in 10 - 15 working days

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019 In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that improve security awareness and protection. Features Offers an understanding of the state of privacy awareness Includes the state of identity theft awareness Covers mobile phone protection Discusses ransomware protection Discloses a plan of action to improve security awareness

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Scene of the Cybercrime
Debra Littlejohn Shinder, Michael Cross Paperback R1,343 Discovery Miles 13 430
Managerial Guide for Handling…
Lech J. Janczewski, Andrew Colarik Hardcover R2,233 Discovery Miles 22 330
Hacking Web Intelligence - Open Source…
Sudhanshu Chauhan, Nutan Kumar Panda Paperback R1,208 Discovery Miles 12 080
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,565 Discovery Miles 15 650
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R520 R489 Discovery Miles 4 890
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,569 Discovery Miles 35 690
Introduction to Cybercrime - Computer…
Joshua B. Hill, Nancy E. Marion Hardcover R2,383 Discovery Miles 23 830
Advanced Persistent Threat…
Eric Cole Paperback R1,111 Discovery Miles 11 110
From Anarchy to Power - The Net Comes of…
Wendy Grossman Hardcover R1,828 Discovery Miles 18 280
The Psychology of Cyber Crime - Concepts…
Grainne Kirwan, Andrew Power Hardcover R4,920 Discovery Miles 49 200

 

Partners