0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (122)
  • R250 - R500 (464)
  • R500+ (1,524)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover): Edward M. Rafalski, Ross M. Mullner Healthcare Analytics - Emergency Preparedness for COVID-19 (Hardcover)
Edward M. Rafalski, Ross M. Mullner
R3,433 Discovery Miles 34 330 Ships in 12 - 19 working days

The first COVID-19 case in the US was reported on January 20, 2020. As the first cases were being reported in the US, Washington State became a reliable source not just for hospital bed demand based on incidence and community spread but also for modeling the impact of skilled nursing facilities and assisted living facilities on hospital bed demand. Various hospital bed demand modeling efforts began in earnest across the United States in university settings, private consulting and health systems. Nationally, the University of Washington Institute of Health Metrics and Evaluation seemed to gain a footing and was adopted as a source for many states for its ability to predict the epidemiological curve by state, including the peak. This book therefore addresses a compelling need for documenting what has been learned by the academic and professional healthcare communities in healthcare analytics and disaster preparedness to this point in the pandemic. What is clear, at least from the US perspective, is that the healthcare system was unprepared and uncoordinated from an analytics perspective. Learning from this experience will only better prepare all healthcare systems and leaders for future crisis. Both prospectively, from a modeling perspective and retrospectively from a root cause analysis perspective, analytics provide clarity and help explain causation and data relationships. A more structured approach to teaching healthcare analytics to students, using the pandemic and the rich dataset that has been developed, provides a ready-made case study from which to learn and inform disaster planning and preparedness. The pandemic has strained the healthcare and public health systems. Researchers and practitioners must learn from this crisis to better prepare our processes for future pandemics, at minimum. Finally, government officials and policy makers can use this data to decide how best to assist the healthcare and public health systems in crisis.

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Paperback)
Nikki. Robinson
R1,132 Discovery Miles 11 320 Ships in 12 - 19 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover): Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram... Next Generation Healthcare Systems Using Soft Computing Techniques (Hardcover)
Rohit Raja, Korhan Cengiz, Hiral Raja, Rekh Ram Janghel
R3,578 Discovery Miles 35 780 Ships in 12 - 19 working days

This book presents soft computing techniques and applications used in healthcare systems, along with the latest advancements. Written as a guide for assessing the roles that these techniques play, the book also highlights implementation strategies, lists problem-solving solutions, and paves the way for future research endeavors in smart and next-generation healthcare systems. This book provides applications of soft computing techniques related to healthcare systems and can be used as a reference guide for assessing the roles that various techniques, such as machine learning, fuzzy logic, and statical mathematics, play in the advancements of smart healthcare systems. The book presents the basics as well as the advanced concepts to help beginners, as well as industry professionals, get up to speed on the latest developments in healthcare systems. The book examines descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in finding solutions to problems in healthcare systems. A framework of robust and novel healthcare techniques is highlighted, as well as implementation strategies and a setup for future research endeavors. Healthcare Systems Using Soft Computing Techniques is a valuable resource for researchers and postgraduate students in healthcare systems engineering, computer science, information technology, and applied mathematics. The book introduces beginners to-and at the same time brings industry professionals up to speed with-the important role soft computing techniques play in smart healthcare systems.

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R5,000 Discovery Miles 50 000 Ships in 9 - 17 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover): Tan Yigitcanlar, Nayomi Kankanamge Urban Analytics with Social Media Data - Foundations, Applications and Platforms (Hardcover)
Tan Yigitcanlar, Nayomi Kankanamge
R3,143 Discovery Miles 31 430 Ships in 12 - 19 working days

The use of data science and urban analytics has become a defining feature of smart cities. This timely book is a clear guide to the use of social media data for urban analytics. The book presents the foundations of urban analytics with social media data, along with real-world applications and insights on the platforms we use today. It looks at social media analytics platforms, cyberphysical data analytics platforms, crowd detection platforms, City-as-a-Platform, and city-as-a-sensor for platform urbanism. The book provides examples to illustrate how we apply and analyse social media data to determine disaster severity, assist authorities with pandemic policy, and capture public perception of smart cities. This will be a useful reference for those involved with and researching social, data, and urban analytics and informatics.

Streaming and Copyright Law - An end-user perspective (Hardcover): Lasantha Ariyarathna Streaming and Copyright Law - An end-user perspective (Hardcover)
Lasantha Ariyarathna
R4,485 Discovery Miles 44 850 Ships in 12 - 19 working days

This book examines the challenges posed to Australian copyright law by streaming, from the end-user perspective. It compares the Australian position with the European Union and United States to draw lessons from them, regarding how they have dealt with streaming and copyright. By critically examining the technological functionality of streaming and the failure of copyright enforcement against the masses, it argues for strengthening end-user rights. The rising popularity of streaming has resulted in a revolutionary change to how digital content, such as sound recordings, cinematographic films, and radio and television broadcasts, is used on the internet. Superseding the conventional method of downloading, using streaming to access digital content has challenged copyright law, because it is not clear whether end-user acts of streaming constitute copyright infringement. These prevailing grey areas between copyright and streaming often make end-users feel doubtful about accessing digital content through streaming. It is uncertain whether exercising the right of reproduction is appropriately suited for streaming, given the ambiguities of "embodiment" and scope of "substantial part". Conversely, the fair dealing defence in Australia cannot be used aptly to defend end-users' acts of streaming digital content, because end-users who use streaming to access digital content can rarely rely on the defence of fair dealing for the purposes of criticism or review, news reporting, parody or satire, or research or study. When considering a temporary copy exception, end-users are at risk of being held liable for infringement when using streaming to access a website that contains infringing digital content, even if they lack any knowledge about the content's infringing nature. Moreover, the grey areas in circumventing geo-blocking have made end-users hesitant to access websites through streaming because it is not clear whether technological protection measures apply to geo-blocking. End-users have a severe lack of knowledge about whether they can use circumvention methods, such as virtual private networks, to access streaming websites without being held liable for copyright infringement. Despite the intricacies between copyright and access to digital content, the recently implemented website-blocking laws have emboldened copyright owners while suppressing end-users' access to digital content. This is because the principles of proportionality and public interest have been given less attention when determining website-blocking injunctions.

The Struggle for Hegemony in Pakistan - Fear, Desire and Revolutionary Horizons (Hardcover): Aasim Sajjad Akhtar The Struggle for Hegemony in Pakistan - Fear, Desire and Revolutionary Horizons (Hardcover)
Aasim Sajjad Akhtar
R3,028 R2,116 Discovery Miles 21 160 Save R912 (30%) Ships in 12 - 19 working days

'A major analysis of our world's political crisis' - Joel Wainwright The collapse of neoliberal hegemony in the western world following the financial crash of 2007-8 and subsequent rise of right-wing authoritarian personalities has been described as a crisis of 'the political' in western societies. But the crisis must be seen as global, rather than focusing on the west alone. Pakistan is experiencing rapid financialisation and rapacious capture of natural resources, overseen by the country's military establishment and state bureaucracy. Under their watch, trading and manufacturing interests, property developers and a plethora of mafias have monopolised the provision of basic needs like housing, water and food, whilst also feeding conspicuous consumption by a captive middle-class. Aasim Sajjad-Akhtar explores neoliberal Pakistan, looking at digital technology in enhancing mass surveillance, commodification and atomisation, as well as resistance to the state and capital. Presenting a new interpretation of our global political-economic moment, he argues for an emancipatory political horizon embodied by the 'classless' subject.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,835 Discovery Miles 18 350 Ships in 12 - 19 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,539 Discovery Miles 15 390 Ships in 12 - 19 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Data - New Trajectories in Law (Paperback): Robert Herian Data - New Trajectories in Law (Paperback)
Robert Herian
R776 Discovery Miles 7 760 Ships in 12 - 19 working days

This book explores the phenomenon of data - big and small - in the contemporary digital, informatic and legal-bureaucratic context. Challenging the way in which legal interest in data has focused on rights and privacy concerns, this book examines the contestable, multivocal and multifaceted figure of the contemporary data subject. The book analyses "data" and "personal data" as contemporary phenomena, addressing the data realms, such as stores, institutions, systems and networks, out of which they emerge. It interrogates the role of law, regulation and governance in structuring both formal and informal definitions of the data subject, and disciplining data subjects through compliance with normative standards of conduct. Focusing on the 'personal' in and of data, the book pursues a re-evaluation of the nature, role and place of the data subject qua legal subject in on and offline societies: one that does not begin and end with the inviolability of individual rights but returns to more fundamental legal principles suited to considerations of personhood, such as stewardship, trust, property and contract. The book's concern with the production, use, abuse and alienation of personal data within the context of contemporary communicative capitalism will appeal to scholars and students of law, science and technology studies, and sociology; as well as those with broader political interests in this area.

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,416 Discovery Miles 34 160 Ships in 12 - 19 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

The Limits of the Digital Revolution - How Mass Media Culture Endures in a Social Media World (Hardcover): Derek Hrynyshyn The Limits of the Digital Revolution - How Mass Media Culture Endures in a Social Media World (Hardcover)
Derek Hrynyshyn
R2,245 Discovery Miles 22 450 Ships in 10 - 15 working days

This academic analysis explores social media, specifically examining its influence on the cultural, political, and economic organization of our society and the role capitalism plays within its domain. In this examination of society and technology, author and educator Derek Hrynyshyn explores the ways in which social media shapes popular culture and how social power is expressed within it. He debunks the misperception of the medium as a social equalizer-a theory drawn from the fact that content is created by its users-and compares it to mass media, identifying the capitalist-driven mechanisms that drive both social media and mass media. The work captures his assessment that social media legitimizes the inequities among the social classes rather than challenging them. The book scrutinizes the difference between social media and mass media, the relationship between technologies and social change, and the role of popular culture in the structure of political and economic power. A careful look at social media networks such as Facebook, Twitter, and Google suggests that these tools are systems of surveillance, monitoring everyday activities for the benefit of advertisers and the networks themselves. Topics covered within the book's 10 detailed chapters include privacy online, freedom of expression, piracy, the digital divide, fragmentation, and social cohesion. Explores the use of blogs, Facebook, and Twitter in revolutionary political action and the effects of "viral" campaigns on political culture Uncovers the truth behind piracy infringements on popular cultural industries Reveals the hidden factors driving the rapid expansion of social media Discusses how capitalism affects the development of social media Examines how social media shares characteristics with and differs from mass media

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,720 Discovery Miles 37 200 Ships in 12 - 19 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,516 Discovery Miles 15 160 Ships in 12 - 19 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,330 Discovery Miles 43 300 Ships in 12 - 19 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,839 Discovery Miles 58 390 Ships in 12 - 19 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R3,126 Discovery Miles 31 260 Ships in 12 - 19 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

Data Publics - Public Plurality in an Era of Data Determinacy (Paperback): Peter Moertenboeck, Helge Mooshammer Data Publics - Public Plurality in an Era of Data Determinacy (Paperback)
Peter Moertenboeck, Helge Mooshammer
R1,380 Discovery Miles 13 800 Ships in 12 - 19 working days

Data has emerged as a key component that determines how interactions across the world are structured, mediated and represented. This book examines these new data publics and the areas in which they become operative, via analysis of politics, geographies, environments and social media platforms. By claiming to offer a mechanism to translate every conceivable occurrence into an abstract code that can be endlessly manipulated, digitally processed data has caused conventional reference systems which hinge on our ability to mark points of origin, to rapidly implode. Authors from a range of disciplines provide insights into such a political economy of data capitalism; the political possibilities of techno-logics beyond data appropriation and data refusal; questions of visual, spatial and geographical organization; emergent ways of life and the environments that sustain them; and the current challenges of data publics, which is explored via case studies of three of the most influential platforms in the social media economy today: Facebook, Instagram and Whatsapp. Data Publics will be of great interest to academics and students in the fields of computer science, philosophy, sociology, media and communication studies, architecture, visual culture, art and design, and urban and cultural studies.

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,813 Discovery Miles 28 130 Ships in 12 - 19 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover): Ishaani Priyadarshini, Chase Cotton Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover)
Ishaani Priyadarshini, Chase Cotton
R3,860 Discovery Miles 38 600 Ships in 12 - 19 working days

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well-its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

Security Risk Models for Cyber Insurance (Paperback): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Paperback)
Caroline Baylon, Jose Vila, David Rios Insua
R1,546 Discovery Miles 15 460 Ships in 12 - 19 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,493 Discovery Miles 24 930 Ships in 12 - 19 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Security Analytics - A Data Centric Approach to Information Security (Hardcover): Mehak Khurana, Shilpa Mahajan Security Analytics - A Data Centric Approach to Information Security (Hardcover)
Mehak Khurana, Shilpa Mahajan
R4,480 Discovery Miles 44 800 Ships in 12 - 19 working days

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

Health Web Science - Social Media Data for Healthcare (Hardcover, 1st ed. 2015): Kerstin Denecke Health Web Science - Social Media Data for Healthcare (Hardcover, 1st ed. 2015)
Kerstin Denecke
R3,183 R1,932 Discovery Miles 19 320 Save R1,251 (39%) Ships in 12 - 19 working days

This book introduces the field of Health Web Science and presents methods for information gathering from written social media data. It explores the availability and utility of the personal medical information shared on social media platforms and determines ways to apply this largely untapped information source to healthcare systems and public health monitoring. Introducing an innovative concept for integrating social media data with clinical data, it addresses the crucial aspect of combining experiential data from social media with clinical evidence, and explores how the variety of available social media content can be analyzed and implemented. The book tackles a range of topics including social media's role in healthcare, the gathering of shared information, and the integration of clinical and social media data. Application examples of social media for health monitoring, along with its usage in patient treatment are also provided. The book also considers the ethical and legal issues of gathering and utilizing social media data, along with the risks and challenges that must be considered when integrating social media data into healthcare choices. With an increased interest internationally in E-Health, Health 2.0, Medicine 2.0 and the recent birth of the discipline of Web Science, this book will be a valuable resource for researchers and practitioners investigating this emerging topic.

Digital Activism and the Global Middle Class - Generation Hashtag (Hardcover): Lukas Schlogl Digital Activism and the Global Middle Class - Generation Hashtag (Hardcover)
Lukas Schlogl
R4,478 Discovery Miles 44 780 Ships in 12 - 19 working days

This book examines the causes of a growing wave of digital activism across developing countries, arguing that it is driven by social change, rather than technological advancement alone Beginning with an investigation into the modernisation of 'middle-income countries' and its ramifications for political culture, the book examines large-scale social media protest during political controversies in Indonesia It departs from a narrow 'digital divide' framing whereby Internet access produces Internet activism and introduces the concepts of 'digital self-expression' and of 'middle-class struggles' to capture the value-stratified nature of political engagement in the online sphere Drawing on a blend of 'big-data' text analyses, representative opinion research and socioeconomic household analyses, a rich picture of the determinants of digital activism emerges This truly cross-disciplinary book will appeal particularly to students and scholars in Political Science, Sociology, International Development, and Communication, but also to anyone eager to learn about political activism, social transformation, and new media from a global perspective

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Research Handbook on the Law and…
Ioannis Kokkoris, Claudia Lemus Hardcover R6,707 Discovery Miles 67 070
Selfies, Sexts And Smartphones - A…
Emma Sadleir Paperback R290 R268 Discovery Miles 2 680
Regulating Social Network Sites - Data…
Asma Vranaki Hardcover R3,330 Discovery Miles 33 300
Like, Comment, Subscribe - Inside…
Mark Bergen Paperback R530 R499 Discovery Miles 4 990
Online Political Hate Speech in Europe…
Giovanni Ziccardi Hardcover R3,032 Discovery Miles 30 320
Facebook
Dana Kilroy Fold-out book or chart R244 Discovery Miles 2 440
Women And Cyber Rights In Africa
Nnenna Ifeanyi-Ajufo, Sebo Tladi Paperback R664 R612 Discovery Miles 6 120
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo Paperback R716 Discovery Miles 7 160
Social Media Marketing - A Quickstudy…
Edwards Poster R247 Discovery Miles 2 470
The Honest Guide to Becoming A Digital…
Elizabeth Benton Paperback R235 Discovery Miles 2 350

 

Partners