0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (90)
  • R500+ (1,349)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Game Theory and Machine Learning for Cyber Security (Hardcover): CA Kamhoua Game Theory and Machine Learning for Cyber Security (Hardcover)
CA Kamhoua
R3,231 Discovery Miles 32 310 Ships in 12 - 17 working days

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems In-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.

Secure Processors Part II - Intel SGX Security Analysis and MIT Sanctum Architecture (Paperback): Victor Costan, Ilia Lebedev,... Secure Processors Part II - Intel SGX Security Analysis and MIT Sanctum Architecture (Paperback)
Victor Costan, Ilia Lebedev, Srinivas Devadas
R2,011 Discovery Miles 20 110 Ships in 10 - 15 working days

This monograph is the second of a two-part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The first part established the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves). This second part extends Part I's description of Intel's Software Guard Extensions (SGX), an available and documented enclave-capable system, with a rigorous security analysis of SGX as a system for trusted remote computation. This part documents the authors' concerns over the shortcomings of SGX as a secure system and introduces the MIT Sanctum processor developed by the authors: a system designed to offer stronger security guarantees, lend itself better to analysis and formal verification, and offer a more straightforward and complete threat model than the Intel system, all with an equivalent programming model. This two-part work advocates a principled, transparent, and well scrutinized approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead. See also: Secure Processors Part I: Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (ISBN 978-1-68083-300-3). Part I of this survey establishes the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves).

Blockchain Technology And Hacking - Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking... Blockchain Technology And Hacking - Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking Computers and Mobile Hacking (Paperback)
Isaac D Cody
R576 Discovery Miles 5 760 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-3) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk Journal of Cyber Security and Mobility (6-3) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk; Neeli R. Prasad
R1,087 Discovery Miles 10 870 Ships in 10 - 15 working days
Secure Processors Part I - Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (Paperback): Victor-Vlad Costan,... Secure Processors Part I - Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (Paperback)
Victor-Vlad Costan, Ilia Lebedev, Srinivas Devadas
R2,364 Discovery Miles 23 640 Ships in 10 - 15 working days

This monograph is the first in a two-part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. It first examines the relevant concepts in computer architecture and cryptography, and then surveys attack vectors and existing processor systems claiming security for remote computation and/or software isolation. It examines, in detail, the modern isolation container (enclave) primitive as a means to minimize trusted software given practical trusted hardware and reasonable performance overhead. Specifically, this work examines the programming model and software design considerations of Intel's Software Guard Extensions (SGX), as it is an available and documented enclave-capable system. This work advocates a principled, transparent, and well-scrutinized approach to secure system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead. See also: Secure Processors Part II: Intel SGX Security Analysis and MIT Sanctum Architecture Part II (ISBN 978-1-68083-302-7). Part II of this survey a deep dive into the implementation and security evaluation of two modern enclave-capable secure processor systems: SGX and MIT's Sanctum. The complex but insufficient threat model employed by SGX motivates Sanctum, which achieves stronger security guarantees under software attacks with an equivalent programming model.

Tor - Remaining Anonymous on the Dark Net in an Era of NSA Spying (Paperback): Miles Price Tor - Remaining Anonymous on the Dark Net in an Era of NSA Spying (Paperback)
Miles Price
R330 Discovery Miles 3 300 Ships in 10 - 15 working days
Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R828 Discovery Miles 8 280 Ships in 10 - 15 working days
Cryptography & Comptia A+ (Paperback): Solis Tech Cryptography & Comptia A+ (Paperback)
Solis Tech
R433 Discovery Miles 4 330 Ships in 10 - 15 working days
Tor - Exactly How to Remain Invisible on the Anonymous Deep Web (Paperback): Joshua Cody Tor - Exactly How to Remain Invisible on the Anonymous Deep Web (Paperback)
Joshua Cody
R406 Discovery Miles 4 060 Ships in 10 - 15 working days
Malware + Robotics + Cryptography (Paperback): Solis Tech Malware + Robotics + Cryptography (Paperback)
Solis Tech
R488 Discovery Miles 4 880 Ships in 10 - 15 working days
Hacking Made Simple - Full Beginners Guide To Master Hacking (Paperback): Project Syntax Hacking Made Simple - Full Beginners Guide To Master Hacking (Paperback)
Project Syntax
R282 Discovery Miles 2 820 Ships in 10 - 15 working days
Hacking University - Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an... Hacking University - Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an Amateur Hacker and Hacking Mobile Devices, Tablets, Game Consoles, and Apps. (Hacking, How to Hack, Hacking for Beginners, Computer, (Paperback)
Isaac D Cody
R516 Discovery Miles 5 160 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-1) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-1) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,074 Discovery Miles 10 740 Ships in 10 - 15 working days
Blockchain & FinTech - A Comprehensive Blueprint to Understanding Blockchain & Financial Technology. 2 Books in 1. (Paperback):... Blockchain & FinTech - A Comprehensive Blueprint to Understanding Blockchain & Financial Technology. 2 Books in 1. (Paperback)
Richard Hayen
R604 Discovery Miles 6 040 Ships in 10 - 15 working days
Hijacked By Hackers Be Afraid - Be very, Very Afraid (Paperback): Michael Klein Hijacked By Hackers Be Afraid - Be very, Very Afraid (Paperback)
Michael Klein
R427 Discovery Miles 4 270 Ships in 10 - 15 working days
A Decade of Lattice Cryptography (Paperback): Chris Peikert A Decade of Lattice Cryptography (Paperback)
Chris Peikert
R2,327 Discovery Miles 23 270 Ships in 10 - 15 working days

Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn as the foundation for secure cryptographic systems. Attractive features of lattice cryptography include apparent resistance to quantum attacks (in contrast with most number-theoretic cryptography), high asymptotic efficiency and parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. This monograph surveys most of the major developments in lattice cryptography over the past ten years. The main focus is on the foundational short integer solution (SIS) and learning with errors (LWE) problems (and their more efficient ring-based variants), their provable hardness assuming the worst-case intractability of standard lattice problems, and their many cryptographic applications.

Cyber Crimes - History of World's Worst Cyber Attacks (Paperback): Vannesa Pitts Cyber Crimes - History of World's Worst Cyber Attacks (Paperback)
Vannesa Pitts
R486 R434 Discovery Miles 4 340 Save R52 (11%) Ships in 10 - 15 working days
Hacking University - Mobile Phone & App Hacking And Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets,... Hacking University - Mobile Phone & App Hacking And Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets, Game Consoles, Apps and Precisely Learn and Conquer the Linux Operating System (Paperback)
Isaac D Cody
R519 Discovery Miles 5 190 Ships in 10 - 15 working days
Hacking University - Learn Python Computer Programming from Scratch & Precisely Learn How The Linux Operating Command Line... Hacking University - Learn Python Computer Programming from Scratch & Precisely Learn How The Linux Operating Command Line Works 2 Manuscript Bundle: The Ultimate Beginners Guide in Mastering Python and a Complete Step by Step Guide in Learning Linux (Paperback)
Isaac D Cody
R543 Discovery Miles 5 430 Ships in 10 - 15 working days
The Encrypted Book of Passwords (Paperback, 2nd edition): Raef Meeuwisse The Encrypted Book of Passwords (Paperback, 2nd edition)
Raef Meeuwisse
R293 Discovery Miles 2 930 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (5-3) (Paperback): Antoni Gobeo, Connor Fowler, William J. Buchanan Journal of Cyber Security and Mobility (5-3) (Paperback)
Antoni Gobeo, Connor Fowler, William J. Buchanan
R1,071 Discovery Miles 10 710 Ships in 10 - 15 working days
Circuit Engineering + Cryptography + Raspberry Pi 2 (Paperback): Solis Tech Circuit Engineering + Cryptography + Raspberry Pi 2 (Paperback)
Solis Tech
R275 Discovery Miles 2 750 Ships in 10 - 15 working days
Quality Assurance + Cryptography + Raspberry Pi 2 (Paperback): Solis Tech Quality Assurance + Cryptography + Raspberry Pi 2 (Paperback)
Solis Tech
R238 Discovery Miles 2 380 Ships in 10 - 15 working days
Circuit Engineering & Cryptography & Hacking (Paperback): Solis Tech Circuit Engineering & Cryptography & Hacking (Paperback)
Solis Tech
R525 Discovery Miles 5 250 Ships in 10 - 15 working days
Cryptography & Robotics (Paperback): Solis Tech Cryptography & Robotics (Paperback)
Solis Tech
R250 Discovery Miles 2 500 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,183 Discovery Miles 11 830
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,773 Discovery Miles 37 730
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,484 Discovery Miles 34 840
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,834 Discovery Miles 68 340
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R4,141 Discovery Miles 41 410
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,834 Discovery Miles 68 340
TLS Mastery
Michael W Lucas Hardcover R995 R876 Discovery Miles 8 760
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,508 R1,231 Discovery Miles 12 310
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,332 Discovery Miles 33 320

 

Partners