0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011): Ling Dong, Kefei Chen Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011)
Ling Dong, Kefei Chen
R4,650 Discovery Miles 46 500 Ships in 10 - 15 working days

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism s efficiency, rigorousness, and the possibility of its automation are also presented.
The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world.
Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.

Security and Software for Cybercafes (Hardcover): Esharenana E. Adomi Security and Software for Cybercafes (Hardcover)
Esharenana E. Adomi
R4,585 Discovery Miles 45 850 Ships in 18 - 22 working days

Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery. Security and Software for Cybercafes provides relevant theoretical frameworks and current empirical research findings on the security measures and software necessary for cybercafes, offering information technology professionals, scholars, researchers, and educators detailed knowledge and understanding of this innovative and leading-edge issue, both in industrialized and developing countries.

Advanced Security Solutions for Multimedia (Hardcover): Irshad Ahmad Ansari, Varun Bajaj Advanced Security Solutions for Multimedia (Hardcover)
Irshad Ahmad Ansari, Varun Bajaj; Contributions by Rishi Sinhal, Tarun Kumar Sharma, Esmaeil Najafi, …
R3,276 Discovery Miles 32 760 Ships in 10 - 15 working days
Technology for Success - Computer Concepts (Paperback, New edition): Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell,... Technology for Success - Computer Concepts (Paperback, New edition)
Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell, Mark Frydenberg, … 1
R1,227 R1,145 Discovery Miles 11 450 Save R82 (7%) Ships in 10 - 15 working days

Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.

Sarbanes-Oxley Guide for Finance and Information Technology Professionals 2e (Hardcover, 2nd Edition): S. Anand Sarbanes-Oxley Guide for Finance and Information Technology Professionals 2e (Hardcover, 2nd Edition)
S. Anand
R1,578 Discovery Miles 15 780 Ships in 18 - 22 working days

Praise for "Sarbanes-Oxley Guide for Finance and Information Technology Professionals"

"Effective SOX programs enlist the entire organization to build and monitor a compliant control environment. However, even the best SOX programs are inefficient at best, ineffective at worst, if there is a lack of informed, competent finance and IT personnel to support the effort. This book provides these important professionals a needed resource for and road map toward successfully implementing their SOX initiative."
--Scott Green Chief Administrative Officer, Weil, Gotshal & Manges LLP and author, "Sarbanes-Oxley and the Board of Directors"

"As a former CFO and CIO, I found this book to be an excellent synopsis of SOX, with impressive implementation summaries and checklists."
--Michael P. Cangemi CISA, Editor in Chief, "Information Systems Control Journal" and author, "Managing the Audit Function"

"An excellent introduction to the Sarbanes-Oxley Act from the perspective of the financial and IT professionals that are on the front lines of establishing compliance in their organizations. The author walks through many areas by asking 'what can go wrong' types of questions, and then outlines actions that should be taken as well as the consequences of noncompliance. This is a good book to add to one's professional library "
--Robert R. Moeller Author, "Sarbanes-Oxley and the New Internal Auditing Rules"

"Mr. Anand has compiled a solid overview of the control systems needed for not only accounting systems, but also the information technologies that support those systems. Among the Sarbanes books on the market, his coverage of both topics is unique."
--Steven M. Bragg Author, "Accounting Best Practices"

"An excellent overview of the compliance process. A must-read for anyone who needs to get up to speed quickly with Sarbanes-Oxley."
--Jack Martin Publisher, "Sarbanes-Oxley Compliance Journal"

Computer Forensics - An Essential Guide for Accountants, Lawyers and Managers (Hardcover): M Sheetz Computer Forensics - An Essential Guide for Accountants, Lawyers and Managers (Hardcover)
M Sheetz
R1,961 Discovery Miles 19 610 Ships in 18 - 22 working days

Would your company be prepared in the event of:
* Computer-driven espionage
* A devastating virus attack
* A hacker's unauthorized access
* A breach of data security?
As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks.
The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs.
Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes.
If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.

Image and Video Encryption - From Digital Rights Management to Secured Personal Communication (Hardcover, 2005 ed.): Andreas... Image and Video Encryption - From Digital Rights Management to Secured Personal Communication (Hardcover, 2005 ed.)
Andreas Uhl, Andreas Pommer
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).

The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.

Privacy Preserving Data Mining (Hardcover, 2006 ed.): Jaideep Vaidya, Christopher W Clifton, Yu Michael Zhu Privacy Preserving Data Mining (Hardcover, 2006 ed.)
Jaideep Vaidya, Christopher W Clifton, Yu Michael Zhu
R2,717 Discovery Miles 27 170 Ships in 18 - 22 working days

Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. Crystallizing much of the underlying foundation, the book aims to inspire further research in this new and growing area.

Privacy Preserving Data Mining is intended to be accessible to industry practitioners and policy makers, to help inform future decision making and legislation, and to serve as a useful technical reference.

Cryptography In The Information Society (Hardcover): Boris Ryabko, Andrey Fionov Cryptography In The Information Society (Hardcover)
Boris Ryabko, Andrey Fionov
R2,153 Discovery Miles 21 530 Ships in 18 - 22 working days

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

Lattice-Based Cryptosystems - A Design Perspective (Hardcover, 1st ed. 2020): Jiang Zhang, Zhenfeng Zhang Lattice-Based Cryptosystems - A Design Perspective (Hardcover, 1st ed. 2020)
Jiang Zhang, Zhenfeng Zhang
R3,984 Discovery Miles 39 840 Ships in 10 - 15 working days

This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based encryption, attribute-based encryption, key change and digital signatures. Given its depth of coverage, the book especially appeals to graduate students and young researchers who plan to enter this research area.

Implementing Cryptography Using Python (Paperback): S Bray Implementing Cryptography Using Python (Paperback)
S Bray
R1,099 R927 Discovery Miles 9 270 Save R172 (16%) Ships in 18 - 22 working days

Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you'll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You'll also explore methods of authenticating messages to ensure that they haven't been tampered with in transit. Finally, you'll learn how to use digital signatures to let others verify the messages sent through your services. Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python Discover the history of cryptography and understand its critical importance in today's digital communication systems Work through real-world examples to understand the pros and cons of various authentication methods Protect your end-users and ensure that your applications and systems are using up-to-date cryptography

Towards a Quarter-Century of Public Key Cryptography - A Special Issue of DESIGNS, CODES AND CRYPTOGRAPHY An International... Towards a Quarter-Century of Public Key Cryptography - A Special Issue of DESIGNS, CODES AND CRYPTOGRAPHY An International Journal. Volume 19, No. 2/3 (2000) (Hardcover, Reprinted from DESIGNS, CODES AND CRYPTOGRAPHY, 19:2/3, 2000)
Neal Koblitz
R2,745 Discovery Miles 27 450 Ships in 18 - 22 working days

Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Towards a Quarter-Century of Public Key Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Steganography Techniques for Digital Images (Hardcover, 1st ed. 2019): Abid Yahya Steganography Techniques for Digital Images (Hardcover, 1st ed. 2019)
Abid Yahya
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Phishing and Countermeasures - Understanding the Increasing Problem of Electronic Identity Theft (Hardcover): M. Jakobsson Phishing and Countermeasures - Understanding the Increasing Problem of Electronic Identity Theft (Hardcover)
M. Jakobsson
R3,051 Discovery Miles 30 510 Ships in 18 - 22 working days

"This book is the encyclopedia of phishing. It provides views from the payment, human, and technical perspectives. The material is remarkably readable--each chapter is contributed by an expert on that topic, but none require specialized background on the part of the reader. The text will be useful for any professional who seeks to understand phishing."
--Directors of the International Financial Cryptography Association (IFCA)

Phishing attacks, or the practice of deceiving people into revealing sensitive data on a computer system, continue to mount. Here is the information you need to understand how phishing works, how to detect it, and how to prevent it.

"Phishing and Countermeasures" begins with a technical introduction to the problem, setting forth the tools and techniques that phishers use, along with current security technology and countermeasures that are used to thwart them. Readers are not only introduced to current techniques of phishing, but also to emerging and future threats and the countermeasures that will be needed to stop them. The potential and limitations of all countermeasures presented in the text are explored in detail. In spite of the fact that phishing attacks constantly evolve, much of the material in this book will remain valid, given that the book covers the general principles as much as actual instances of phishing.

While delving into a myriad of countermeasures and defense strategies, the authors also focus on the role of the user in preventing phishing attacks. The authors assert that countermeasures often fail not for technical reasons, but rather because users are unable or unwilling to use them. In response, the authors present a number ofcountermeasures that are simple for users to implement, or that can be activated without a user's direct participation. Moreover, the authors propose strategies for educating users. The text concludes with a discussion of how researchers and security professionals can ethically and legally perform phishing experiments to test the effectiveness of their defense strategies against the strength of current and future attacks.

Each chapter of the book features an extensive bibliography to help readers explore individual topics in greater depth. With phishing becoming an ever-growing threat, the strategies presented in this text are vital for technical managers, engineers, and security professionals tasked with protecting users from unwittingly giving out sensitive data. It is also recommended as a textbook for students in computer science and informatics.

Snort Intrusion Detection and Prevention Toolkit (Paperback): Brian Caswell, Jay Beale, Andrew Baker Snort Intrusion Detection and Prevention Toolkit (Paperback)
Brian Caswell, Jay Beale, Andrew Baker
R1,079 R901 Discovery Miles 9 010 Save R178 (16%) Ships in 10 - 15 working days

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.
This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features.
Thecompanion materialcontains examples from real attacks allowing readers test their new skills. The book will begin with a discussion of packet inspection and the progression from intrusion detection to intrusion prevention. The authors provide examples of packet inspection methods including: protocol standards compliance, protocol anomaly detection, application control, and signature matching. In addition, application-level vulnerabilities including Binary Code in HTTP headers, HTTP/HTTPS Tunneling, URL Directory Traversal, Cross-Site Scripting, and SQL Injection will also be analyzed. Next, a brief chapter on installing and configuring Snort will highlight various methods for fine tuning your installation to optimize Snort performance including hardware/OS selection, finding and eliminating bottlenecks, and benchmarking and testing your deployment. A special chapter also details how to use Barnyard to improve the overall performance of Snort. Next, best practices will be presented allowing readers to enhance the performance of Snort for even the largest and most complex networks. The next chapter reveals the inner workings of Snort by analyzing the source code. The next several chapters will detail how to write, modify, and fine-tune basic to advanced rules and pre-processors. Detailed analysis of real packet captures will be provided both in the book and the companion material. Several examples for optimizing output plugins will then be discussed including a comparison of MySQL and PostrgreSQL. Best practices for monitoring Snort sensors and analyzing intrusion data follow with examples of real world attacks using: ACID, BASE, SGUIL, SnortSnarf, Snort_stat.pl, Swatch, and more.
The last part of the book contains several chapters on active response, intrusion prevention, and using Snort s most advanced capabilities for everything from forensics and incident handling to building and analyzing honey pots. Data from real world attacks will be presented throughout this part as well as on the companion website, http: //booksite.elsevier.com/9781597490993/
This fully integrated book and Web toolkit covers everything all in one convenient package It is authored by members of the Snort team and it is packed full of their experience and expertiseIncludes full coverage of the brand new Snort version 2.6, packed full of all the latest informationCompanion website at http: //booksite.elsevier.com/9781597490993/contains all companion material"

Digital Media Steganography - Principles, Algorithms, and Advances (Paperback): Mahmoud Hassaballah Digital Media Steganography - Principles, Algorithms, and Advances (Paperback)
Mahmoud Hassaballah
R2,548 Discovery Miles 25 480 Ships in 10 - 15 working days

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography.

Fundamentals of Computer Security (Hardcover, 2003 ed.): Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry Fundamentals of Computer Security (Hardcover, 2003 ed.)
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
R2,587 Discovery Miles 25 870 Ships in 10 - 15 working days

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New): Carl Roper, Dr Lynn Fischer, Joseph... Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New)
Carl Roper, Dr Lynn Fischer, Joseph A. Grau
R1,325 Discovery Miles 13 250 Ships in 10 - 15 working days

This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors and outside training companies to provide training which is often dry, stilted, and not always applicable to a specific corporate or government setting. This title addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice when developing or presenting any form of security education, training, motivation or awareness.
* Shows how to establish and integrate a structured, internally consistent and coherent program from the ground up
* Illustrates how to assess and analyze security program needs and audience and customize training accordingly
* Numerous Appendices to help the security manager justify security spending on training initiatives

Secure Electronic Voting (Hardcover, 2003 ed.): Dimitris A. Gritzalis Secure Electronic Voting (Hardcover, 2003 ed.)
Dimitris A. Gritzalis
R2,777 Discovery Miles 27 770 Ships in 18 - 22 working days

Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The chapters identify and describe the given capabilities and the strong limitations, as well as the current trends and future perspectives of electronic voting technologies, with emphasis in security and privacy. Secure Electronic Voting includes state-of-the-art material on existing and emerging electronic and Internet voting technologies, which may eventually lead to the development of adequately secure e-voting systems. This book also includes an overview of the legal framework with respect to voting, a description of the user requirements for the development of a secure e-voting system, and a discussion on the relevant technical and social concerns. Secure Electronic Voting includes, also, three case studies on the use and evaluation of e-voting systems in three different real world environments.

Everyday Cryptography - Fundamental Principles and Applications (Hardcover, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Hardcover, 2nd Revised edition)
Keith Martin
R3,374 Discovery Miles 33 740 Ships in 10 - 15 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Adaptive Cryptographic Access Control (Hardcover, 2010 ed.): Anne V. D. M. Kayem, Selim G Akl, Patrick Martin Adaptive Cryptographic Access Control (Hardcover, 2010 ed.)
Anne V. D. M. Kayem, Selim G Akl, Patrick Martin
R2,730 Discovery Miles 27 300 Ships in 18 - 22 working days

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.

The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges.

Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.

Insider Computer Fraud - An In-depth Framework for Detecting and Defending against Insider IT Attacks (Paperback): Kenneth... Insider Computer Fraud - An In-depth Framework for Detecting and Defending against Insider IT Attacks (Paperback)
Kenneth Brancik
R1,883 Discovery Miles 18 830 Ships in 10 - 15 working days

An organization's employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud. Drawing from the author's vast experience assessing the adequacy of IT security for the banking and securities industries, the book presents a practical framework for identifying, measuring, monitoring, and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks, it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit, process, and store sensitive data. The author also examines the symbiotic relationship between the risks, controls, threats, and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat, this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process.

Information Assurance Architecture (Paperback): Keith D. Willett Information Assurance Architecture (Paperback)
Keith D. Willett
R1,914 Discovery Miles 19 140 Ships in 10 - 15 working days

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information Assurance Architecture, Keith D. Willett draws on his over 25 years of technical, security, and business experience to provide a framework for organizations to align information assurance with the enterprise and their overall mission. The Tools to Protect Your Secrets from Exposure This work provides the security industry with the know-how to create a formal information assurance architecture that complements an enterprise architecture, systems engineering, and the enterprise life cycle management (ELCM). Information Assurance Architecture consists of a framework, a process, and many supporting tools, templates and methodologies. The framework provides a reference model for the consideration of security in many contexts and from various perspectives; the process provides direction on how to apply that framework. Mr. Willett teaches readers how to identify and use the right tools for the right job. Furthermore, he demonstrates a disciplined approach in thinking about, planning, implementing and managing security, emphasizing that solid solutions can be made impenetrable when they are seamlessly integrated with the whole of an enterprise. Understand the Enterprise Context This book covers many information assurance subjects, including disaster recovery and firewalls. The objective is to present security services and security mechanisms in the context of information assurance architecture, and in an enterprise context of managing business risk. Anyone who utilizes the concepts taught in these pages will find them to be a valuable weapon in the arsenal of information protection.

Data-driven Block Ciphers for Fast Telecommunication Systems (Paperback): Nikolai Moldovyan, Alexander A. Moldovyan Data-driven Block Ciphers for Fast Telecommunication Systems (Paperback)
Nikolai Moldovyan, Alexander A. Moldovyan
R1,858 Discovery Miles 18 580 Ships in 10 - 15 working days

The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts. In Data-Driven Block Ciphers for Fast Telecommunication Systems, Nikolai Moldovyan and Alexander Moldovyan, major innovators and holders of several dozen international patents in encryption technology, provide the background and detail the applications needed to investigate new properties of PNs especially relevant to the improvement of modern wireless systems.Furthermore, they propose a universal architecture involving controlled bit permutation instruction that will permit the performance of both data-driven permutations and an arbitrary prescribed fixed permutation in a single cycle. Immediately improved efficiency for current and future fast telecommunication systems and mobile networksBecause of its simplicity and efficient use of current hardware, the embedding of this architecture is a highly attractive option for CPU manufacturers.By detailing all the relevant information into a single volume for the first time, the authors of this book make that option more feasible than ever before.

Computer Forensics - Evidence Collection and Management (Paperback): Robert C. Newman Computer Forensics - Evidence Collection and Management (Paperback)
Robert C. Newman
R1,917 Discovery Miles 19 170 Ships in 10 - 15 working days

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, … Hardcover R5,077 Discovery Miles 50 770
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Corporate Cybersecurity - Identifying…
J. Jackson Hardcover R2,573 Discovery Miles 25 730

 

Partners