0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (4)
  • R250 - R500 (36)
  • R500+ (302)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Zero Trust Journey Across the Digital Estate (Hardcover): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Hardcover)
Abbas Kudrati, Binil A. Pillai
R3,048 Discovery Miles 30 480 Ships in 12 - 17 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Zero Trust Journey Across the Digital Estate (Paperback): Abbas Kudrati, Binil A. Pillai Zero Trust Journey Across the Digital Estate (Paperback)
Abbas Kudrati, Binil A. Pillai
R1,359 Discovery Miles 13 590 Ships in 12 - 17 working days

* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.

Digital Forensics in the Era of Artificial Intelligence (Paperback): Nour Moustafa Digital Forensics in the Era of Artificial Intelligence (Paperback)
Nour Moustafa
R1,413 Discovery Miles 14 130 Ships in 12 - 17 working days

Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.

Digital Forensics in the Era of Artificial Intelligence (Hardcover): Nour Moustafa Digital Forensics in the Era of Artificial Intelligence (Hardcover)
Nour Moustafa
R2,544 Discovery Miles 25 440 Ships in 12 - 17 working days

Digital forensics plays a crucial role in identifying, analysing, and presenting cyber threats as evidence in a court of law. Artificial intelligence, particularly machine learning and deep learning, enables automation of the digital investigation process. This book provides an in-depth look at the fundamental and advanced methods in digital forensics. It also discusses how machine learning and deep learning algorithms can be used to detect and investigate cybercrimes. This book demonstrates digital forensics and cyber-investigating techniques with real-world applications. It examines hard disk analytics and style architectures, including Master Boot Record and GUID Partition Table as part of the investigative process. It also covers cyberattack analysis in Windows, Linux, and network systems using virtual machines in real-world scenarios. Digital Forensics in the Era of Artificial Intelligence will be helpful for those interested in digital forensics and using machine learning techniques in the investigation of cyberattacks and the detection of evidence in cybercrimes.

Cyber Crime Investigator's Field Guide (Hardcover, 3rd edition): Bruce Middleton Cyber Crime Investigator's Field Guide (Hardcover, 3rd edition)
Bruce Middleton
R1,799 Discovery Miles 17 990 Ships in 12 - 17 working days

Unique selling point: * Set up to be used as a college textbook with a complete "Case Study" that involves the use of Python (a very key programming language at this time) Core audience: * Cyber security professionals, college students in a cyber forensics class, and individuals interested in cyber crime Place in the market: * Will build on the success of the previous two editions

Cybercrime and Digital Forensics - An Introduction (Hardcover, 3rd edition): Thomas J. Holt, Adam M Bossler, Kathryn C... Cybercrime and Digital Forensics - An Introduction (Hardcover, 3rd edition)
Thomas J. Holt, Adam M Bossler, Kathryn C Seigfried-Spellar
R4,159 Discovery Miles 41 590 Ships in 12 - 17 working days

This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: * key theoretical and methodological perspectives; * computer hacking and malicious software; * digital piracy and intellectual theft; * economic crime and online fraud; * pornography and online sex crime; * cyber-bullying and cyber-stalking; * cyber-terrorism and extremism; * the rise of the Dark Web; * digital forensic investigation and its legal context around the world; * the law enforcement response to cybercrime transnationally; * cybercrime policy and legislation across the globe. The new edition has been revised and updated, featuring two new chapters; the first offering an expanded discussion of cyberwarfare and information operations online, and the second discussing illicit market operations for all sorts of products on both the Open and Dark Web. This book includes lively and engaging features, such as discussion questions, boxed examples of unique events and key figures in offending, quotes from interviews with active offenders, and a full glossary of terms. It is supplemented by a companion website that includes further exercises for students and instructor resources. This text is essential reading for courses on cybercrime, cyber-deviancy, digital forensics, cybercrime investigation, and the sociology of technology.

A Fresh Look at Fraud - Theoretical and Applied Perspectives (Hardcover): Yaniv Hanoch, Stacey Wood A Fresh Look at Fraud - Theoretical and Applied Perspectives (Hardcover)
Yaniv Hanoch, Stacey Wood
R4,078 Discovery Miles 40 780 Ships in 12 - 17 working days

Features cross-disciplinary exchange among psychologists, criminologists, and computer scientists addressing fraud, scams, and financial abuse Includes discussion of the 'Next Frontiers' in research and important insights on how to create solutions

White-Collar Crime Online - Deviance, Organizational Behaviour and Risk (Hardcover, 1st ed. 2022): Petter Gottschalk,... White-Collar Crime Online - Deviance, Organizational Behaviour and Risk (Hardcover, 1st ed. 2022)
Petter Gottschalk, Christopher Hamerton
R3,455 Discovery Miles 34 550 Ships in 10 - 15 working days

This initiating monograph provides the first thorough examination of the concept of white-collar crime online. Applying an offender-based perspective which considers the central role of convenience, it seeks to inform, improve and develop the current literature on cybercrime, whilst paying particular attention to its founding category within criminology. It argues that white-collar crime has receded from criminological perspectives on cybercrime in recent years and that a detailed, rich re-assessment of white-collar crime in contemporary digital societies is needed. Following a theoretical introduction, the book develops to discuss, inter alia, implications for corporate reputation, the various organizational roles utilized in mitigating external and internal threats, the unique considerations involved in law enforcement efforts, and likely future directions within the field. White-Collar Crime Online recognises the strong lineage and correlation that exists between the study of white-collar crime and cybercrime. Using convenience theory within a comparative analysis which includes case-studies, the book explores both European and American paradigms, perspectives and models to determine where white-collar crime exists within the contemporary workplace and how this might relate to the ongoing discourse on cybercrime. In doing so it revaluates criminological theory within the context of changing patterns of business, the workplace, social rules, systems of governance, decision making, social ordering and control. White-Collar Crime Online will speak to criminologists, sociologists and professionals; including those interested in cyber-security, economics, technology and computer science.

Economic Crime - From Conception to Response (Hardcover): Mark Button, Branislav Hock, David Shepherd Economic Crime - From Conception to Response (Hardcover)
Mark Button, Branislav Hock, David Shepherd
R4,089 Discovery Miles 40 890 Ships in 12 - 17 working days

This book offers a fresh approach to a range of pressing issues, emphasising the value of establishing economic crime as a sub-discipline within criminology. This will be essential reading for a range of more applied graduate courses across the UK and Europe on counter-fraud, money laundering, corruption, security management and financial crime investigation. Given the prominence of 'economic crime' amongst police forces, law enforcement agencies and government, this book has a secondary market amongst practitioners.

The SME Business Guide to Fraud Risk Management (Hardcover): Robert James Chapman The SME Business Guide to Fraud Risk Management (Hardcover)
Robert James Chapman
R4,112 Discovery Miles 41 120 Ships in 12 - 17 working days

* A straightforward yet comprehensive guide about risk specifically for smaller businesses. * Fraud is an increasing area of concern, and one that particularly impacts SMEs. This easy-to-access book provides, in one place, key details of all of the primary fraud types affecting SMEs so that they do not have to carry out their own extensive and very time-consuming research. * Case studies are presented throughout to give real life instances of fraud events.

Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised... Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers (Hardcover, 1st ed. 2019)
Gilbert Peterson, Sujeet Shenoi
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: forensic models, mobile and embedded device forensics, filesystem forensics, image forensics, and forensic techniques. This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of fourteen edited papers from the Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2019. Advances in Digital Forensics XV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Hacking Wireless Access Points - Cracking, Tracking, and Signal Jacking (Paperback): Jennifer Ann Kurtz Hacking Wireless Access Points - Cracking, Tracking, and Signal Jacking (Paperback)
Jennifer Ann Kurtz
R1,039 Discovery Miles 10 390 Ships in 12 - 17 working days

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.

Making Sense of Cyber Capabilities for Small States - Case Studies from the Asia-Pacific (Hardcover): Francis C. Domingo Making Sense of Cyber Capabilities for Small States - Case Studies from the Asia-Pacific (Hardcover)
Francis C. Domingo
R4,079 Discovery Miles 40 790 Ships in 12 - 17 working days

Domingo explores the potential of cyber capabilities for small states in the Asia-Pacific, the most active region for cyber conflict. He develops a systematic explanation for why Brunei, New Zealand, and Singapore have developed or are developing cyber capabilities. Studies on cyber conflict and strategy have substantially increased in the past decade but most have focused on the cyber operations of powerful states. This book moves away from the prominence of powerful states and explores the potential of cyber capabilities for small states in the Asia-Pacific, the most active region for cyber conflict. It develops a systematic explanation of why Brunei, New Zealand, and Singapore have developed or are developing cyber capabilities despite its obscure strategic value. The book argues that the distribution of power in the region and a "technology-oriented" strategic culture are two necessary conditions that influence the development of cyber capabilities in small states. Following this argument, the book draws on neoclassical realism as a theoretical framework to account for the interaction between these two conditions. The book also pursues three secondary objectives. First, it aims to determine the constraints and incentives that affect the utilization of cyber capabilities as foreign policy instruments. Second, the book evaluates the functionality of these cyber capabilities for small states. Lastly, it assesses the implications of employing cyber capabilities as foreign policy tools of small states. This book will be an invaluable resource for academics and security analysts working on cyber conflict, military strategy, small states, and International Relations in general.

The Rise of Politically Motivated Cyber Attacks - Actors, Attacks and Cybersecurity (Hardcover): Tine Munk The Rise of Politically Motivated Cyber Attacks - Actors, Attacks and Cybersecurity (Hardcover)
Tine Munk
R4,077 Discovery Miles 40 770 Ships in 12 - 17 working days

This book outlines the complexity in understanding different forms of cyber attacks, the actors involved, and their motivations. It explores the key challenges in investigating and prosecuting politically motivated cyber attacks, the lack of consistency within regulatory frameworks, and the grey zone that this creates, for cybercriminals to operate within. Connecting diverse literatures on cyberwarfare, cyberterrorism, and cyberprotests, and categorising the different actors involved - state-sponsored/supported groups, hacktivists, online protestors - this book compares the means and methods used in attacks, the various attackers, and the current strategies employed by cybersecurity agencies. It examines the current legislative framework and proposes ways in which it could be reconstructed, moving beyond the traditional and fragmented definitions used to manage offline violence. This book is an important contribution to the study of cyber attacks within the areas of criminology, criminal justice, law, and policy. It is a compelling reading for all those engaged in cybercrime, cybersecurity, and digital forensics.

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R768 Discovery Miles 7 680 Ships in 12 - 17 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

The Security Hippie (Paperback): Barak Engel The Security Hippie (Paperback)
Barak Engel
R1,113 Discovery Miles 11 130 Ships in 12 - 17 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

The Security Hippie (Hardcover): Barak Engel The Security Hippie (Hardcover)
Barak Engel
R3,337 Discovery Miles 33 370 Ships in 12 - 17 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Advanced Cybersecurity Technologies (Hardcover): Ralph Moseley Advanced Cybersecurity Technologies (Hardcover)
Ralph Moseley
R3,919 Discovery Miles 39 190 Ships in 12 - 17 working days

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable. Cryptography is explained in detail with examples, showing the steady progress in this area over time through to the possibilities of quantum encryption. Steganography is also explained, showing how this can be used in a modern-day context through multimedia and even Virtual Reality. A large section of the book is given to the technical side of hacking, how such attacks occur, how they can be avoided and what to do after there has been an intrusion of some description. Cyber countermeasures are explored, along with automated systems of defense, whether created by the programmer or through firewalls and suchlike. The human aspect of cyber security is detailed along with the psychology and motivations for launching attacks. Social engineering is focused on and with the various techniques looked at - revealing how an informed individual, organization or workplace can protect themselves against incursions and breaches. Finally, there is a look the latest developments in the field, and how systems, such as the IoT are being protected. The book is intended for advanced undergraduate and postgraduate courses on cybersecurity but is also useful for those studying IT or Computer Science more generally.

Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools (Hardcover): Abbas Moallem Understanding Cybersecurity Technologies - A Guide to Selecting the Right Cybersecurity Tools (Hardcover)
Abbas Moallem
R2,599 Discovery Miles 25 990 Ships in 12 - 17 working days

Cyberattacks on enterprises, government institutions, and individuals are exponentially growing. At the same time, the number of companies, both small and large, offering all types of solutions has been increasing too. Since companies rely on technological solutions to protect themselves against cyberattacks, understanding and selecting the right solutions among those offered presents a significant challenge for professionals, company executives, and newcomers to the cybersecurity field. FEATURES Presents descriptions for each type of cybersecurity technology and their specifications Explains applications, usages, and offers case studies to enhance comprehension Offers an easy-to-understand classification of existing cybersecurity technologies Provides an understanding of the technologies without getting lost in technical details Focuses on existing technologies used in different solutions, without focusing on the companies that offer these technologies This book is intended to help all professionals new to cybersecurity, students, and experts to learn or educate their audiences on the foundations of the available solutions.

Cyber Victimology - Decoding Cyber-Crime Victimisation (Paperback): Debarati Halder Cyber Victimology - Decoding Cyber-Crime Victimisation (Paperback)
Debarati Halder
R1,166 Discovery Miles 11 660 Ships in 12 - 17 working days

Written by leading international experts in field of cybercrimnology Provides a global socio-legal perspective Written in non-technical style without jargon Suitable for use as a textbook in cyber victimology courses Presents practical solutions for the problem

Theories of Terrorism - Contemporary Perspectives (Hardcover): Murat Haner, Melissa M. Sloan Theories of Terrorism - Contemporary Perspectives (Hardcover)
Murat Haner, Melissa M. Sloan
R4,100 Discovery Miles 41 000 Ships in 12 - 17 working days

The key feature of the text is its concise, scholarly depth, and accessible format, which enable readers to gain a clear understanding of the theory that they may use in future research. Current texts on the market include redundant, lengthy presentations of theories that fail to distinguish among key theoretical contributions. Terrorism is an area of urgent global concern. The number of terrorism and homeland security-focused academic programs, think tanks, and research centers has dramatically increased over the past two decades. Many universities now offer courses on issues related to terrorism at both the undergraduate and graduate levels within the social science disciplines as well as interdisciplinary centers. Yet, there is only one text and a few book chapters on theories of terrorism. The approach that we will use in the book will make it attractive to academics, students, and policy makers who seek to develop theoretically-driven approaches to policy making. Considering the current number of programs on terrorism and homeland security within the United States alone, the growing emphasis on terrorism studies across the world, and the absence of a clear text on theories of terrorism, the demand should be quite high. This will be the only text that offers chapter-length descriptions of each stage of the radicalization process covering pressing issues in the field of terrorism.

An In-Depth Guide to Mobile Device Forensics (Hardcover): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Hardcover)
Chuck Easttom
R3,491 Discovery Miles 34 910 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Nanoelectronic Devices for Hardware and Software Security (Hardcover): Balwinder Raj, Arun Kumar Singh Nanoelectronic Devices for Hardware and Software Security (Hardcover)
Balwinder Raj, Arun Kumar Singh
R3,212 Discovery Miles 32 120 Ships in 12 - 17 working days

Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this evolving era, nanotechnology is converting semiconductor devices dimensions from micron technology to nanotechnology. Nanoelectronics would be the key enabler for innovation in nanoscale devices, circuits, and systems. The motive for this research book is to provide relevant theoretical frameworks that include device physics, modeling, circuit design, and the latest developments in experimental fabrication in the field of nanotechnology for hardware/software security. There are numerous challenges in the development of models for nanoscale devices (e.g., FinFET, gate-all-around devices, TFET, etc.), short channel effects, fringing effects, high leakage current, and power dissipation, among others. This book will help to identify areas where there are challenges and apply nanodevice and circuit techniques to address hardware/software security issues.

National Cyber Emergencies - The Return to Civil Defence (Paperback): Greg Austin National Cyber Emergencies - The Return to Civil Defence (Paperback)
Greg Austin
R1,275 Discovery Miles 12 750 Ships in 12 - 17 working days

This book documents and explains civil defence preparations for national cyber emergencies in conditions of both peace and war. The volume analyses the escalating sense of crisis around state-sponsored cyber attacks that has emerged since 2015, when the United States first declared a national emergency in cyberspace. It documents a shift in thinking in the USA, from cooperative resilience-oriented approaches at national level to more highly regulated, state-led civil defence initiatives. Although the American response has been mirrored in other countries, the shift is far from universal. Civil defence strategies have come into play but the global experience of that has not been consistent or even that successful. Containing contributions from well-placed scholars and practitioners, this volume reviews a selection of national experiences (from the USA, Australia, India, China, Estonia, and Finland) and a number of key thematic issues (information weapons, alliance coordination, and attack simulations). These demonstrate a disconnect between the deepening sense of vulnerability and the availability of viable solutions at the national level. Awareness of this gap may ultimately lead to more internationally oriented cooperation, but the trend for now appears to be more conflictual and rooted in a growing sense of insecurity. This book will be of much interest to students of cyber security, homeland security, disaster management, and international relations, as well as practitioners and policy-makers.

Advanced Security Solutions for Multimedia (Hardcover): Irshad Ahmad Ansari, Varun Bajaj Advanced Security Solutions for Multimedia (Hardcover)
Irshad Ahmad Ansari, Varun Bajaj; Contributions by Rishi Sinhal, Tarun Kumar Sharma, Esmaeil Najafi, …
R3,392 Discovery Miles 33 920 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Hacker's Guide to OS X - Exploiting…
Robert Bathurst, Russ Rogers, … Paperback R1,018 R769 Discovery Miles 7 690
Handbook of Computer Crime Investigation…
Eoghan Casey Paperback R1,608 Discovery Miles 16 080
The Hacking of America - Who's Doing It…
Bernadette H Schell, John L. Dodge Hardcover R2,573 Discovery Miles 25 730
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, … Hardcover R3,698 Discovery Miles 36 980
Data Protection on the Move - Current…
Serge Gutwirth, Ronald Leenes, … Hardcover R5,088 Discovery Miles 50 880
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R579 R501 Discovery Miles 5 010
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R423 Discovery Miles 4 230
Masters of Deception: the Gang That…
Michele Slatalla Paperback R448 R381 Discovery Miles 3 810
Permanent Record
Edward Snowden Paperback  (1)
R384 Discovery Miles 3 840
No Tech Hacking - A Guide to Social…
Johnny Long Paperback R1,036 R845 Discovery Miles 8 450

 

Partners