![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Equip your students with a management-focused overview of information security as well as the tools to effectively administer it with Whitman/Mattord's MANAGEMENT OF INFORMATION SECURITY, Sixth Edition. More than ever, we need to prepare information security management students to build and staff security programs capable of securing systems and networks to meet the challenges in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate weaknesses in current information technologies. This text offers an exceptional blend of skills and experiences to administer and manage the more secure computing environments that organizations need. Reflecting the latest developments from the field, it includes updated coverage of NIST, ISO and security governance along with emerging concerns like Ransomware, Cloud Computing and the Internet of Things.
This thought-provoking book challenges the way we think about the regulation of cryptoassets based on cryptographic consensus technology. Bringing a timely new perspective, Syren Johnstone critiques the application of a financial regulation narrative to cryptoassets, questions the assumptions on which it is based, and considers its impact on industry development. Providing new insights into the dynamics of oversight regulation, Johnstone argues that the financial narrative stifles the 'New Prospect' for the formation of novel commercial relationships and institutional arrangements. The book asks whether regulations developed in the 20th century remain appropriate to apply to a technology emerging in the 21st, suggesting it is time to think about how to regulate for ecosystem development. Johnstone concludes with proposals for reform, positing a new framework that facilitates industry aspirations while remaining sustainable and compatible with regulatory objectives. Rethinking the Regulation of Cryptoassets will be an invaluable read for policy makers, regulators and technologists looking for a deeper understanding of the issues surrounding cryptoasset regulation and possible alternative approaches. It will also be of interest to scholars and students researching the intersection of law, technology, regulation and finance.
Blockchain has potential to revolutionize how manufacturers design, engineer, make and scale their products. Blockchain is gradually proving to be an effective "middleware" solution for enabling seamless interoperability within complex supply chains. Due to its technological nature, blockchain enables secure, transparent and fast data exchanges as well as allowing for the creation of immutable records databases The main advantage of Blockchain in Manufacturing Industries is product traceability, supply chain transparency, compliance monitoring, and auditability. Moreover, leveraging blockchain technology into a manufacturing enterprise can enhance its security and reduce the rates of systematic failures. So, blockchain is now used in various sectors of the manufacturing industry, such as automotive, aerospace, defense, pharmaceutical, consumer electronics, textile, food and beverages, and more. Hence, Blockchain should be seen as an investment in future-readiness and customer-centricity, not as an experimental technology - because, the evidence is overwhelming. This book will explore the strengths of Blockchain adaptation in Manufacturing Industries and Logistics Management, cover different use cases of Blockchain Technology for Manufacturing Industries and Logistics Management, and will discuss the role, impact and challenges of adopting Blockchain in Manufacturing industries and Logistics Management. The chapters will also provide the current open issues and future research trends of Blockchain, especially for Manufacturing Industries and Logistics, and will encapsulate quantitative and qualitative research for a wide spectrum of readers of the book.
The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.
CYBERSECURITY LAW Learn to protect your clients with this definitive guide to cybersecurity law in this fully-updated third edition Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the confidentiality, integrity, and availability of data is crucial. Cybersecurity can be used to protect assets of all kinds, including data, desktops, servers, buildings, and most importantly, humans. Understanding the ins and outs of the legal rules governing this important field is vital for any lawyer or other professionals looking to protect these interests. The thoroughly revised and updated Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments on the subject. This comprehensive text deals with all aspects of cybersecurity law, from data security and enforcement actions to anti-hacking laws, from surveillance and privacy laws to national and international cybersecurity law. New material in this latest edition includes many expanded sections, such as the addition of more recent FTC data security consent decrees, including Zoom, SkyMed, and InfoTrax. Readers of the third edition of Cybersecurity Law will also find: An all-new chapter focused on laws related to ransomware and the latest attacks that compromise the availability of data and systems New and updated sections on new data security laws in New York and Alabama, President Biden's cybersecurity executive order, the Supreme Court's first opinion interpreting the Computer Fraud and Abuse Act, American Bar Association guidance on law firm cybersecurity, Internet of Things cybersecurity laws and guidance, the Cybersecurity Maturity Model Certification, the NIST Privacy Framework, and more New cases that feature the latest findings in the constantly evolving cybersecurity law space An article by the author of this textbook, assessing the major gaps in U.S. cybersecurity law A companion website for instructors that features expanded case studies, discussion questions by chapter, and exam questions by chapter Cybersecurity Law is an ideal textbook for undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. It is also a useful reference for IT professionals, government personnel, business managers, auditors, cybersecurity insurance agents, and academics in these fields, as well as academic and corporate libraries that support these professions.
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including web accessibility; the digital divide; youth protection and surveillance; Information security; education; ethics in the Information professions and Internet voting; this book provides an invaluable resource for students, scholars and professionals currently working in information Technology related areas.
Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.
The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard. The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file. There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche. By reading this title readers will be provided with a step by step hands-on guide that includes: Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing data How to use open source, time-proven and peer-reviewed cryptographic software Easy to follow tips for safer computing Unbiased and platform-independent coverage of encryption tools
and techniques
The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.
Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking and Commerce discusses the challenges of providing security for online applications and transactions. Highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols, this book is an essential reference source for financial planners, academicians, researchers, advanced-level students, government officials, managers, and technology developers.
Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications. De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
An all-star cast of authors analyze the top IT security threats for
2008 as selected by the editors and readers of Infosecurity
Magazine. This book, compiled from the Syngress Security Library,
is an essential reference for any IT professional managing
enterprise security. It serves as an early warning system, allowing
readers to assess vulnerabilities, design protection schemes and
plan for disaster recovery should an attack occur. Topics include
Botnets, Cross Site Scripting Attacks, Social Engineering, Physical
and Logical Convergence, Payment Card Industry (PCI) Data Security
Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. |
You may like...
New Developments in Formal Languages and…
Gemma Bel-Enguix, M. Dolores Jimenez-Lopez, …
Hardcover
R4,159
Discovery Miles 41 590
Research Anthology on Implementing…
Information R Management Association
Hardcover
R15,742
Discovery Miles 157 420
Research Anthology on Implementing…
Information R Management Association
Hardcover
R15,726
Discovery Miles 157 260
Multibiometric Watermarking with…
Rohit M. Thanki, Vedvyas J. Dwivedi, …
Hardcover
R1,421
Discovery Miles 14 210
Genres on the Web - Computational Models…
Alexander Mehler, Serge Sharoff, …
Hardcover
R4,212
Discovery Miles 42 120
Cognitively Inspired Natural Language…
Abhijit Mishra, Pushpak Bhattacharyya
Hardcover
R2,654
Discovery Miles 26 540
|