0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (119)
  • R250 - R500 (429)
  • R500+ (1,355)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Making with Data - Physical Design and Craft in a Data-Driven World (Paperback): Samuel Huron, Till Nagel, Lora Oehlberg,... Making with Data - Physical Design and Craft in a Data-Driven World (Paperback)
Samuel Huron, Till Nagel, Lora Oehlberg, Wesley Willett
R1,428 Discovery Miles 14 280 Ships in 9 - 17 working days

Key Selling Points The first book to showcase physical representations of data, and the first to discuss the creative process behind them. Approaches the topic from a multidisciplinary perspective, showcasing a range of creative approaches from computer science, data science, graphic design, art, craft, and architecture. The book is heavily visual and illustrates each project and the process of creating it via rich photos and sketches, which are accessible and inspiring for both enthusiasts and experts.

Cybercrime and Cybersecurity in the Global South (Hardcover): N Kshetri Cybercrime and Cybersecurity in the Global South (Hardcover)
N Kshetri
R3,299 Discovery Miles 32 990 Ships in 10 - 15 working days

Global cybercrime is arguably the biggest underworld industry of our times. Global forces and technologies such as mobile phones, social media and cloud computing are shaping the structure of the global cybercrime industry estimated at US$1 trillion. Nir Kshetri documents and compares the patterns, characteristics and processes of cybercrime activities in major regions and economies in the Global South such as China, India, the former Second World economies, Latin America and the Caribbean, Sub-Saharan Africa and Middle East and North Africa. Integrating theories from a wide range of disciplines, he explains initiatives at the global, supranational, national, sub-national and local levels.

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Paperback)
Gulizar Haciyakupoglu, Yasmine Wong
R1,236 Discovery Miles 12 360 Ships in 10 - 15 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover): Gulizar Haciyakupoglu,... Gender and Security in Digital Space - Navigating Access, Harassment, and Disinformation (Hardcover)
Gulizar Haciyakupoglu, Yasmine Wong
R4,070 Discovery Miles 40 700 Ships in 10 - 15 working days

Digital space offers new avenues, opportunities, and platforms in the fight for gender equality, and for the social, economic, and political participation of women and marginalised communities. However, the very same space plays host to gender inequalities and security threats with gendered implications. This edited volume ventures into complexities at the intersection of gender, security, and digital space, with a particular focus on the persistent problems of access, harassment, and disinformation. Scholars and practitioners in this volume tackle various facets of the issue, presenting an array of research, experiences, and case studies that span the globe. This knowledge lends itself to potential policy considerations in tackling inequalities and threats with gendered implications in cyber space towards digital spaces that are safe and equal. This book is a must-read for students, scholars, and practitioners seeking to expand their knowledge on the gendered threats in digital space and potential remedies against them.

Building an Innovation Hotspot - Approaches and Policies to Stimulating New Industry (Paperback): Alicia (Lucy) Cameron Building an Innovation Hotspot - Approaches and Policies to Stimulating New Industry (Paperback)
Alicia (Lucy) Cameron
R1,465 Discovery Miles 14 650 Ships in 10 - 15 working days

Evaluates innovation policy and actions and considers real-world examples. Looks to the future of innovation and the role of future technologies. Provides an overview of recent policy trends in innovation and how they contribute to the creation of technology hotspots. Identifies how governments, industry, the research community and local communities can work together to craft individualised approaches to increasing innovation at a local level and building new industries.

How To Make Your Dog #Famous - A Guide to Social Media and Beyond (Paperback): Loni Edwards How To Make Your Dog #Famous - A Guide to Social Media and Beyond (Paperback)
Loni Edwards
R375 R341 Discovery Miles 3 410 Save R34 (9%) Ships in 9 - 17 working days

You know your dog is the cutest but does everyone else know it too? In this book, Loni Edwards, the human behind the world's most influential pets, breaks down the path to fame. Discover insights into the success of social media's top pups and follow the essential steps on the road to fame - from crafting your brand to advocating for your pup on set. With expert guidance on how to be a good dog parent and make sure your pup is happy and healthy every step of the way, this is your one-stop guide to helping your dog win over hearts, one adorable post at a time. Featuring the stories of more than 40 of the most successful pet influencers: 157 of Gemma, Amazing Graciedoodle, Barkley Sir Charles, Bertie Bert the Pom, Bronson the Bully, Brussels Sprout, Bully Baloo, Charlie the Black Shepherd, Chloe the Mini Frenchie (& Emma Bear), Coco the Maltese Dog (Coco & Cici), Cookie Malibu, Crusoe the Celebrity Dachshund, Daily Dougie, Dog named Stella, Ducky the Yorkie, Frame the Weim, Gone to the Snow Dogs, Harlow and Sage, Hi Wiley, Kelly Bove, Lilybug, Lizzie Bear, Louboutina the Hugging Dog, Maya Polar Bear, Mervin the Chihuahua, Milo and Noah, MJ the Beagle, Mr. Biggie, Popeye the Foodie, Puggy Smalls, Reagandoodle, Remix the Dog, Rocco Roni, Super Corgi Jojo, Super Scooty, Tatum, That Goldendoodle, The Bike Dog, Tika the Iggy, Tuna Melts my Heart, Tupey the Borzoi, Verpinscht, Winnie the Cocker, Wolfgang 2242

CyRM - Mastering the Management of Cybersecurity (Paperback): David X. Martin CyRM - Mastering the Management of Cybersecurity (Paperback)
David X. Martin
R1,173 Discovery Miles 11 730 Ships in 10 - 15 working days

Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.

The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover): Shaun Aghili The Auditor's Guide to Blockchain Technology - Architecture, Use Cases, Security and Assurance (Hardcover)
Shaun Aghili
R3,381 Discovery Miles 33 810 Ships in 10 - 15 working days

Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues

The Pathology of Communicative Capitalism (Hardcover, 1st ed. 2015): David W. Hill The Pathology of Communicative Capitalism (Hardcover, 1st ed. 2015)
David W. Hill
R1,372 Discovery Miles 13 720 Ships in 18 - 22 working days

This book diagnoses the social, mental and political consequences of working and economic organizations that generate value from communication. It calls for the role of communication technologies to be reimagined in order to create a healthier, fairer society.

tmux 2 (Paperback): Brian P. Hogan tmux 2 (Paperback)
Brian P. Hogan
R561 R470 Discovery Miles 4 700 Save R91 (16%) Ships in 10 - 15 working days

Your mouse is slowing you down. The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.2, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row. You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.2, you can improve your productivity and regain your focus. This book will show you how. This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10. Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system. Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.

Cyber Security Applications for Industry 4.0 (Hardcover): R. Sujatha, G. Prakash, Noor Zaman Jhanjhi Cyber Security Applications for Industry 4.0 (Hardcover)
R. Sujatha, G. Prakash, Noor Zaman Jhanjhi
R3,655 Discovery Miles 36 550 Ships in 10 - 15 working days

Cyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide accurate, real-time monitoring and control for smart applications and services. With better access to information from real-time manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve efficiency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulnerabilities in an organization's technology, including limited security mechanisms and logs, make the move to smart systems particularly challenging. Features: Proposes a conceptual framework for Industry 4.0-based Cyber Security Applications concerning the implementation aspect Creates new business models for Industrialists on Control Systems and provides productive workforce transformation Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and planning to work in the new area of Industry 4.0 Addresses the protection of plants from the frost and insects, automatic hydroponic irrigation techniques, smart industrial farming and crop management in agriculture relating to data security initiatives The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0 enabled connected systems and their limitations

AI and Society - Tensions and Opportunities (Hardcover): Christo El Morr AI and Society - Tensions and Opportunities (Hardcover)
Christo El Morr
R2,817 Discovery Miles 28 170 Ships in 10 - 15 working days

AI's impact on human societies is and will be drastic in so many ways. AI is being adopted and implemented around the world, and government and universities are investing in AI studies, research, and development. However, very little research exists about the impact of AI on our lives. This book will address this gap; it will gather reflections from around the world to assess the impact of AI on different aspects of society as well as propose ways in which we can address this impact and the research agendas needed.

Teach Yourself Making Money in the Second Life World (Paperback): Irie Tsure Teach Yourself Making Money in the Second Life World (Paperback)
Irie Tsure
R93 Discovery Miles 930 Ships in 10 - 15 working days

Written by successful Second Life resort owner Irie Tsure, this comprehensive guide will accompany you on the tricky journey from Newbie to practising expert in the virtual world of Second Life. Teach Yourself Making Money in the Second Life World is intended to cover every skill required to enjoy and prosper within this virtual world but in particular focuses on those entrepreneurial activities, strategies and skills which can help you get ahead in business in Second Life. This book is packed with advice for virtual entrepreneurs looking to develop independent businesses within SL, perfect for individuals or small companies interested in entering SL and succeeding there. Authored by an established, popular business savvy and creative SL character, areas covered include: The Second Life economy Intellectual property rights Creating retail objects Creating fashion items including clothing, hair and footwear Scripting Creating animations including QAvimator and how to upload an animation Putting it all together including the creative process Retail outlets and venues including how,to rent or to buy space,store design and layout, selling your products in-world,opening a resort or nightclub, streaming music into Second Life,including your own music, developing the business,minimising lag, community and staff Land management including: finding, buying and selling land in Second Life, obtaining a private island, making money from virtual land, managing a Shopping Mall, checking and improving a region's performance Real-world brands in Second Life - examining the opportunities etc Marketing in second life including: branding, Second Life groups, promoting your business Appendices: A Irie's summary of success; B My past, our present and the future; C: Useful keyboard shortcuts Most other books are written by techies or tourists, not by an author who has actually made the SL experience work for themselves. This is the real McCoy.

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,126 Discovery Miles 11 260 Ships in 10 - 15 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

IoT and AI Technologies for Sustainable Living - A Practical Handbook (Hardcover): Abid Hussain, Garima Tyagi, Sheng-Lung Peng IoT and AI Technologies for Sustainable Living - A Practical Handbook (Hardcover)
Abid Hussain, Garima Tyagi, Sheng-Lung Peng
R3,102 Discovery Miles 31 020 Ships in 10 - 15 working days

Unique selling point: * Brings together insights on various fields, and how IoT and AI combined can help bring about sustainable living Core audience: * Researchers and academics - worldwide applicability Place in the market: * Gives a more comprehensive overview of the potential applications of IoT and AI for sustainability than other books on the market

Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover): Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram... Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover)
Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram Janghel
R3,650 Discovery Miles 36 500 Ships in 10 - 15 working days

This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the basics as well as the advanced concepts to help beginners, as well as industry professionals, get up to speed on the latest developments in healthcare systems. The book examines descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in finding solutions to problems in healthcare systems. A framework of robust and novel healthcare techniques is highlighted, as well as implementation strategies and a setup for future research endeavors. Healthcare Systems Using Soft Computing Techniques is a valuable resource for researchers and postgraduate students in healthcare systems engineering, computer science, information technology, and applied mathematics. The book introduces beginners to-and at the same time brings industry professionals up to speed with-the important role soft computing techniques play in smart healthcare systems.

Chinese Social Media - Face, Sociality, and Civility (Hardcover): Shuhan Chen, Peter Lunt Chinese Social Media - Face, Sociality, and Civility (Hardcover)
Shuhan Chen, Peter Lunt
R2,535 Discovery Miles 25 350 Ships in 18 - 22 working days

What role does social media play in the lives of Chinese youths as they adapt to the rapid economic and social changes in modern China? This book examines the social media experiences and practices of young middle class Chinese who moved to Beijing to study and with the hope of work and participation in the possibilities of social and professional life. Through an analysis of their use of WeChat we explore their enthusiasm for self-expression online, their mediated social relations (guanxi) with family, friends, classmates and colleagues and their engagement with questions of online civility. The authors argue that sustaining personal and social relationships in the context of China's modernity, including its soft regulation of internet and social media, demands new norms of positivity and online civility. This is framed by several tensions: between emerging opportunities for freedom of expression and long-standing traditions of social identity and reputation such as face (lian and mianzi); between traditional obligations to parents (xiaoshun) and the desire for personal autonomy; and the pressure to constitute and govern the internet as a space of positive energy and civility in support of national Chinese sovereignty. The social media practices and deliberations of the participants reveal a fascinating amalgam of traditional Chinese culture and philosophy and reflections on tradition and collectivism combined with an embrace of Western-influenced ideas of positive psychology, self-expression, social networks and pragmatic social relations.

Dating, Mating, Relating - Personal Advertising and Modern Romance (Paperback): Pamela Anne Quiroz Dating, Mating, Relating - Personal Advertising and Modern Romance (Paperback)
Pamela Anne Quiroz
R864 Discovery Miles 8 640 Ships in 10 - 15 working days

To fit a changing society, the conventional ways we date and mate have given way to brand new methods. People nowadays marry later in life, choose not to marry at all, seek partners after divorce, outlive spouses, relocate to new areas and even endure pandemics. This signifies that we are moving toward larger dating pools, something made possible through public personal advertising. This text details personal advertising in print and digital media, as well as online dating services, speed dating, the use of mobile dating apps and other topics. Interviews reveal the appeal and limitations of personal advertising for meeting people. This book offers a window into the development of trust and relationships, as well as the increasing role technology plays in shaping how people meet and mate in the modern world.

Cybercrime - Protecting your business, your family and yourself (Paperback): Todd Wade Cybercrime - Protecting your business, your family and yourself (Paperback)
Todd Wade
R888 Discovery Miles 8 880 Ships in 18 - 22 working days

This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, falls victim to cybercrime. With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.

Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R3,085 Discovery Miles 30 850 Ships in 10 - 15 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Streaming and Copyright Law - An end-user perspective (Hardcover): Lasantha Ariyarathna Streaming and Copyright Law - An end-user perspective (Hardcover)
Lasantha Ariyarathna
R4,503 Discovery Miles 45 030 Ships in 10 - 15 working days

This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,790 Discovery Miles 27 900 Ships in 10 - 15 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

Use and Misuse of New Technologies - Contemporary Challenges in International and European Law (Hardcover, 1st ed. 2019): Elena... Use and Misuse of New Technologies - Contemporary Challenges in International and European Law (Hardcover, 1st ed. 2019)
Elena Carpanelli, Nicole Lazzerini
R4,742 Discovery Miles 47 420 Ships in 18 - 22 working days

The ever-increasing use of technology is challenging the current status of the law, bringing about new problems and questions. The book addresses this trend from the perspective of International law and European Union law and is divided into three main thematic sections. The first section focuses on the legal implications of the use of technology either for law enforcement purposes or in the context of military activities, and examines how this use adds a new dimension to perennial issues, such as the uneasy balance between security concerns and the protection of individual rights, and defining the exact scope of certain State obligations. In so doing, it takes into account a range of current and potential scenarios at the international, regional and domestic level, including the use of killer robots, databases, drones and technology in general to patrol borders, exchange information on criminal suspects, maintain public order, target suspected terrorists and conduct military activities. In turn, the second section examines the role of institutional and non-institutional actors in establishing substantive normative standards for the use of high-tech applications. In this respect, it focuses both on the role that European courts have played so far, and on how other actors' initiatives can contribute to the construction of a new legal framework for technology-related activities. Lastly, the third section has a two-fold focus: the first part investigates how the increasing reliance on technology is affecting traditional rules on international responsibility, and is challenging, in particular, the attribution of wrongful conduct to States and international organizations. The second part addresses issues of jurisdiction and justiciability. Given the scope of its coverage, this timely book addresses an important lacuna in the current legal scholarship, exploring some of the most recent applications of technology and the legal issues arising as a result. Readers will gain novel insights into the challenges posed to International law and European law by the growing reliance on technology, taking into account both its uses and misuses.

Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover): Ishaani Priyadarshini, Chase Cotton Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover)
Ishaani Priyadarshini, Chase Cotton
R3,634 Discovery Miles 36 340 Ships in 10 - 15 working days

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well-its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Progress in Turbulence VII - Proceedings…
Ramis Oerlu, Alessandro Talamelli, … Hardcover R5,789 R4,658 Discovery Miles 46 580
Non-perturbative Methods in Statistical…
Jan Friedrich Hardcover R3,984 Discovery Miles 39 840
Frequency Domain Analysis and Design of…
Xingjian Jing, Ziqiang Lang Hardcover R3,714 R3,453 Discovery Miles 34 530
The Multimedia Internet
Stephen Weinstein Hardcover R2,866 Discovery Miles 28 660
Semantic Mashups - Intelligent Reuse of…
Brigitte Endres-Niggemeyer Hardcover R3,221 R2,049 Discovery Miles 20 490
Efficiency in Complex Systems…
Georgi Yordanov Georgiev, Mahmoud Shokrollahi-Far Hardcover R5,139 Discovery Miles 51 390
Web Engineering - 9th International…
Martin Gaedke, Michael Grossniklaus, … Paperback R1,478 Discovery Miles 14 780
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan Hardcover R6,633 Discovery Miles 66 330
Complex System Modelling and Control…
Quanmin Zhu, Ahmad Taher Azar Hardcover R4,196 Discovery Miles 41 960
Stochastic Evolutions of Dynamic Traffic…
Xiqun (Michael) Chen, Lili, … Hardcover R1,415 Discovery Miles 14 150

 

Partners