0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (182)
  • R250 - R500 (605)
  • R500+ (5,313)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

CISA - Certified Information Systems Auditor Study Guide 4e (Paperback, 4th Edition): Cannon CISA - Certified Information Systems Auditor Study Guide 4e (Paperback, 4th Edition)
Cannon
R1,739 R1,389 Discovery Miles 13 890 Save R350 (20%) Ships in 9 - 17 working days

The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. * Discover how much you already know by beginning with an assessment test * Understand all content, knowledge, and tasks covered by the CISA exam * Get more in-depths explanation and demonstrations with an all-new training video * Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.

CompTIA Security+ Guide To Network Security Fundamentals (Paperback, 8th Edition): Mark Ciampa CompTIA Security+ Guide To Network Security Fundamentals (Paperback, 8th Edition)
Mark Ciampa
R1,420 R1,316 Discovery Miles 13 160 Save R104 (7%) Ships in 10 - 15 working days

Mapped to the new CompTIA Security+ SY0-701 Certification Exam, Ciampa's COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 8th Edition, thoroughly prepares readers for professional certification and career success.

The text covers general security concepts, threats, vulnerabilities and mitigations, security architecture, security operations and security program management and oversight. It also includes expansive coverage of attack vectors and attack surfaces, social engineering attacks, data controls, endpoint vulnerabilities and defenses, identity and access management, infrastructure and wireless security, cloud and virtualization security, artificial intelligence and vulnerability management.

New Hands-On Projects, case activities and virtual online cybersecurity lab exercises help readers put what they learn into practice.

Managing Business Projects - The Essentials (Paperback, 3rd Edition): Frank Einhorn Managing Business Projects - The Essentials (Paperback, 3rd Edition)
Frank Einhorn
R515 Discovery Miles 5 150 Ships in 5 - 10 working days

Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost, it is about business projects as opposed to construction or engineering projects. Although many techniques, like schedule management, apply to both, they are usually applied differently. As its title conveys, the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects, up to $20 million, but often below $1 million. Some literature favors large and mega-projects, but for every mega-project, there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless, the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects.

This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos.' Rather, it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea, which is stated repeatedly, is to do the essentials and to do them consistently and well.

Strong emphasis is placed on things that happen before, around, and after the project itself. So, while the basic disciplines like engaging with stakeholders, managing scope, schedules, costs, risks, issues, changes, and communication, are thoroughly explained, other important aspects are covered. These include: governance of a project and of a portfolio of projects, project selection with its financial and non-financial aspects, effective use of the business case through to benefits realization, procurement, outsourcing and partnership, and also the agile mindset that is valuable beyond Agile projects.

Besides project managers and sponsors, this book is intended for people who are working in business or government, at any level, or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students, although many would benefit from the contents.

Safety of Web Applications - Risks, Encryption and Handling Vulnerabilities with PHP (Hardcover): Eric Quinton Safety of Web Applications - Risks, Encryption and Handling Vulnerabilities with PHP (Hardcover)
Eric Quinton
R2,473 Discovery Miles 24 730 Ships in 12 - 19 working days

Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common attacks, and identification and rights allocation.

RIoT Control - Understanding and Managing Risks and the Internet of Things (Paperback, UK ed.): Tyson Macaulay RIoT Control - Understanding and Managing Risks and the Internet of Things (Paperback, UK ed.)
Tyson Macaulay
R1,461 R1,230 Discovery Miles 12 300 Save R231 (16%) Ships in 12 - 19 working days

In RIOT Control, security experts from McAfee discuss how the Internet of Things (IoT) flips the current internet with de-centralized, uncontrolled elements driving massive data from the ends into central servers and the cloud, rather than the other way around. Some estimates suggest that every human being will soon be surrounded by 1,000 to 5,000 connected objects eventually, 100 trillion static or moving objects which makes for a complex system, prone to unexpected behaviors. As various industry domains rush to adopt IoT technologies, they need guidance on IoT-ready security and risk management practices to ensure system availability and security.

This book explains IoT risk in terms of project requirements, business needs, and system designs that include endpoints, network connectivity, and cloud-based data centers. Understand the threats and vulnerabilities of the IoT, as well as performance metrics at the enterprise level. In recommending emerging techniques, the authors provide insight to help judge which are best according to specific risks and organizational needs under consideration. Multiple case studies span several chapters to better illustrate the business, operational, and technical risks inherent in IoT deployments.
Explains sources of risk across IoT architectures: endpoints, network, and cloud-based data centersIncludes multiple case studies threaded through several chapters covering business, operational, and technical risk issuesOffers insight from Intel (McAfee) insiders about emerging tools and techniques for real-world IoT systems

Security Careers - Skills, Compensation, and Career Paths (Paperback, 3rd edition): Stephen W. Walker, James E. Foushee Security Careers - Skills, Compensation, and Career Paths (Paperback, 3rd edition)
Stephen W. Walker, James E. Foushee
R1,916 Discovery Miles 19 160 Ships in 12 - 19 working days

The third edition of "Security Careers" is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethicsoccupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushee Group, which has been conducting this research since 1980.

"Security Careers" includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough understanding of competitive pay practices across the industry. This book can be used by anyone who manages security personnel or by security professionals who want to develop their careers.

"Security Careers" is a part of Elsevier s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Fills the need for solid information based on accurate job descriptions and surveys of industry compensation professionalsCreated for hands-on use: readers may use the job descriptions in their own hiring and staffing plansSheds light on compensation practices and shows security executives how to influence them"

PCI Dss: A Pocket Guide (Paperback, 6th ed.): IT Governance PCI Dss: A Pocket Guide (Paperback, 6th ed.)
IT Governance
R417 Discovery Miles 4 170 Ships in 12 - 19 working days

This pocket guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource. It will teach you how to protect your customers' cardholder data with best practice from the Standard.

Two-Factor Authentication (Paperback): Mark Stanislav Two-Factor Authentication (Paperback)
Mark Stanislav; Edited by It Governance Publishing
R534 Discovery Miles 5 340 Ships in 12 - 19 working days

Passwords are not enough A password is a single authentication factor - anyone who has it can use it. No matter how strong it is, if it's lost or stolen, it's entirely useless at keeping information private. To secure your data properly, you also need to use a separate, secondary authentication factor. Data breaches are now commonplace In recent years, large-scale data breaches have increased dramatically in both severity and number, and the loss of personal information - including password data - has become commonplace. Furthermore, the fact that rapidly evolving password-cracking technology and the habitual use - and reuse - of weak passwords has rendered the security of username and password combinations negligible, and you have a very strong argument for more robust identity authentication. Consumers are beginning to realise just how exposed their personal and financial information is, and are demanding better security from the organisations that collect, process and store it. This has led to a rise in the adoption of two-factor authentication (TFA or 2FA). In the field of authentication security, the method of proving identity can be broken down into three characteristics - roughly summarised as 'what you have', 'what you are' and 'what you know'. Two-factor authentication relies on the combination of two of these factors. Product overview TFA is nothing new. It's mandated by requirement 8.3 of the Payment Card Industry Data Security Standard (PCI DSS) and banks have been using it for years, combining payment cards ('what you have') and PINs ('what you know'). If you use online banking you'll probably also have a chip authentication programme (CAP) keypad, which generates a one-time password (OTP). What is new is TFA's rising adoption beyond the financial sector. Two-Factor Authentication provides a comprehensive evaluation of popular secondary authentication methods, such as: Hardware-based OTP generation SMS-based OTP delivery Phone call-based mechanisms Geolocation-aware authentication Push notification-based authentication Biometric authentication factors Smart card verification As well as examining MFA (multi-factor authentication), 2SV (two-step verification) and strong authentication (authentication that goes beyond passwords, using security questions or layered security), the book also discusses the wider application of TFA for the average consumer, for example at such organisations as Google, Amazon and Facebook. It also considers the future of multi-factor authentication, including its application to the Internet of Things (IoT). Increasing your password strength will do absolutely nothing to protect you from online hacking, phishing attacks or corporate data breaches. If you're concerned about the security of your personal and financial data, you need to read this book. About the author Mark Stanislav is an information technology professional with over a decade's varied experience in systems administration, web application development and information security. He is currently a senior security consultant for the Strategic Services team at Rapid7. Mark has spoken internationally at nearly 100 events, including RSA, DEF CON, SecTor, SOURCE Boston, ShmooCon and THOTCON. News outlets such as the Wall Street Journal, Al Jazeera America, Fox Business, MarketWatch, CNN Money, Yahoo Finance, Marketplace and The Register have featured Mark's research, initiatives and insights on information security.

AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback): Santana AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback)
Santana
R1,489 R1,241 Discovery Miles 12 410 Save R248 (17%) Ships in 10 - 15 working days

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics. Covers all AWS Certified Security Specialty exam topics Explains AWS cybersecurity techniques and incident response Covers logging and monitoring using the Amazon cloud Examines infrastructure security Describes access management and data protection With a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.

ISO27001/ISO27002 - A Pocket Guide (Paperback): Alan Calder ISO27001/ISO27002 - A Pocket Guide (Paperback)
Alan Calder
R683 Discovery Miles 6 830 Ships in 12 - 19 working days

ISO/IEC 27001:2005 is an international standard for information security management systems (ISMSs). Closely allied to ISO/IEC 27002:2005 (which used to be known as ISO17799), this standard (sometimes called the ISMS standard) can help organisations meet all their information-related regulatory compliance objectives and can help them prepare and position themselves for new and emerging regulations. Information is the lifeblood of today s organis-ation and, therefore, ensuring that information is simultaneously protected and available to those who need it is essential to modern business operations. Information systems are not usually designed from the outset to be secure. Technical security measures and checklists are limited in their ability to protect a complete information system. Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. ISO/IEC 27001 provides the specification for an information security management system and, in the related Code of Practice, ISO/IEC 27002, it draws on the knowledge of a group of experienced information security practitioners in a wide range of significant organisations across more than 40 countries to set out best practice in information security. An ISO27001-compliant system will provide a systematic approach to ensuring the availability, confidentiality and integrity of corporate information. The controls of ISO27001 are based on identifying and combating the entire range of potential risks to the organisation s information assets. This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Key features include: The ISO/IEC 27000 Family of Information Security Standards Background to the Standards Specification vs Code of Practice Certification process The ISMS and ISO27001 Overview of ISO/IEC 27001:2005 Documentation & Records Management Responsibility Policy & Scope Risk Assessment Implementation

Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (Hardcover): Arshi Naim, Praveen Kumar Malik,... Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (Hardcover)
Arshi Naim, Praveen Kumar Malik, Firasat Ali Zaidi
R6,724 Discovery Miles 67 240 Ships in 10 - 15 working days

The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for today's data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.

Global Perspectives on Information Security Regulations - Compliance, Controls, and Assurance (Hardcover): Guillermo A. Francia... Global Perspectives on Information Security Regulations - Compliance, Controls, and Assurance (Hardcover)
Guillermo A. Francia Iii, Jeffrey S. Zanzig
R6,432 Discovery Miles 64 320 Ships in 10 - 15 working days

Recent years have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information; the privacy of consumers; and the continuity of economic activity. Compliance is a measure of the extent to which a current state is in conformance with a desired state. The desired state is commonly operationalized through specific business objectives, professional standards, and regulations. Assurance services provide a means of evaluating the level of compliance with various cybersecurity requirements. The proposed book will summarize current cybersecurity guidance and provide a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators. This publication will provide a synopsis of current cybersecurity guidance that organizations should consider in establishing and updating their cybersecurity systems. Assurance services will also be addressed so that management and their auditors can regularly evaluate their extent of compliance. This book should be published because its theme will provide company management, practitioners, and academics with a good summary of current guidance and how to conduct assurance of appropriate compliance.

Cybersecurity Issues and Challenges for Business and FinTech Applications (Hardcover): Saqib Saeed, Abdullah M. Almuhaideb,... Cybersecurity Issues and Challenges for Business and FinTech Applications (Hardcover)
Saqib Saeed, Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Yousaf Bin Zikria
R8,410 Discovery Miles 84 100 Ships in 10 - 15 working days

Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. Cyberattacks incur financial losses for organizations and can affect their reputations. Due to this, cybersecurity has become critical for business enterprises. Extensive technological adoption in businesses and the evolution of FinTech applications require reasonable cybersecurity measures to protect organizations from internal and external security threats. Recent advances in the cybersecurity domain such as zero trust architecture, application of machine learning, and quantum and post-quantum cryptography have colossal potential to secure technological infrastructures. Cybersecurity Issues and Challenges for Business and FinTech Applications discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. Covering essential topics such as artificial intelligence, social commerce, and data leakage, this reference work is ideal for cybersecurity professionals, business owners, managers, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.

Handbook of Research on Cyber Security Intelligence and Analytics (Hardcover): Jena Om Prakash, H L Gururaj, M.R. Pooja, S.P.... Handbook of Research on Cyber Security Intelligence and Analytics (Hardcover)
Jena Om Prakash, H L Gururaj, M.R. Pooja, S.P. Pavan Kumar
R6,432 Discovery Miles 64 320 Ships in 10 - 15 working days

Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. The Handbook of Research on Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.

System of Controls - I.T.'s Guide to Managing Cyber Risk (Hardcover): William D Reed System of Controls - I.T.'s Guide to Managing Cyber Risk (Hardcover)
William D Reed
R1,029 R890 Discovery Miles 8 900 Save R139 (14%) Ships in 10 - 15 working days
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (Hardcover): Maurice Dawson, Oteng Tabona,... Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security (Hardcover)
Maurice Dawson, Oteng Tabona, Thabiso Maupong
R6,432 Discovery Miles 64 320 Ships in 10 - 15 working days

Developing nations have seen many technological advances in the last decade. Although beneficial and progressive, they can lead to unsafe mobile devices, system networks, and internet of things (IoT) devices, causing security vulnerabilities that can have ripple effects throughout society. While researchers attempt to find solutions, improper implementation and negative uses of technology continue to create new security threats to users. Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security brings together research-based chapters and case studies on systems security techniques and current methods to identify and overcome technological vulnerabilities, emphasizing security issues in developing nations. Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the techniques, laws, and training initiatives currently being implemented and adapted for secure computing.

Handbook of Research on Cyber Approaches to Public Administration and Social Policy (Hardcover): Fahri OEzsungur Handbook of Research on Cyber Approaches to Public Administration and Social Policy (Hardcover)
Fahri OEzsungur
R8,654 Discovery Miles 86 540 Ships in 10 - 15 working days

During the COVID-19 era, the functions of social policy and public administration have undergone a meaningful change, especially with the advancement of digital elements and online and virtual functions. Cyber developments, cyber threats, and the effects of cyberwar on the public administrations of countries have become critical research subjects, and it is important to have resources that can introduce and guide users through the current best practices, laboratory methods, policies, protocols, and more within cyber public administration and social policy. The Handbook of Research on Cyber Approaches to Public Administration and Social Policy focuses on the post-pandemic changes in the functions of social policy and public administration. It also examines the implications of the cyber cosmos on public and social policies and practices from a broad perspective. Covering topics such as intersectional racism, cloud computing applications, and public policies, this major reference work is an essential resource for scientists, laboratory technicians, professionals, technologists, computer scientists, policymakers, students, educators, researchers, and academicians.

Research Anthology on Business Aspects of Cybersecurity (Hardcover): Information Resources Management Association Research Anthology on Business Aspects of Cybersecurity (Hardcover)
Information Resources Management Association
R12,400 Discovery Miles 124 000 Ships in 10 - 15 working days

Cybersecurity is vital for all businesses, regardless of sector. With constant threats and potential online dangers, businesses must remain aware of the current research and information available to them in order to protect themselves and their employees. Maintaining tight cybersecurity can be difficult for businesses as there are so many moving parts to contend with, but remaining vigilant and having protective measures and training in place is essential for a successful company. The Research Anthology on Business Aspects of Cybersecurity considers all emerging aspects of cybersecurity in the business sector including frameworks, models, best practices, and emerging areas of interest. This comprehensive reference source is split into three sections with the first discussing audits and risk assessments that businesses can conduct to ensure the security of their systems. The second section covers training and awareness initiatives for staff that promotes a security culture. The final section discusses software and systems that can be used to secure and manage cybersecurity threats. Covering topics such as audit models, security behavior, and insider threats, it is ideal for businesses, business professionals, managers, security analysts, IT specialists, executives, academicians, researchers, computer engineers, graduate students, and practitioners.

Machine Learning Techniques for Pattern Recognition and Information Security (Hardcover): Mohit Dua, Ankit Kumar Jain Machine Learning Techniques for Pattern Recognition and Information Security (Hardcover)
Mohit Dua, Ankit Kumar Jain
R8,638 Discovery Miles 86 380 Ships in 10 - 15 working days

The artificial intelligence subset machine learning has become a popular technique in professional fields as many are finding new ways to apply this trending technology into their everyday practices. Two fields that have majorly benefited from this are pattern recognition and information security. The ability of these intelligent algorithms to learn complex patterns from data and attain new performance techniques has created a wide variety of uses and applications within the data security industry. There is a need for research on the specific uses machine learning methods have within these fields, along with future perspectives. Machine Learning Techniques for Pattern Recognition and Information Security is a collection of innovative research on the current impact of machine learning methods within data security as well as its various applications and newfound challenges. While highlighting topics including anomaly detection systems, biometrics, and intrusion management, this book is ideally designed for industrial experts, researchers, IT professionals, network developers, policymakers, computer scientists, educators, and students seeking current research on implementing machine learning tactics to enhance the performance of information security.

Advances in Malware and Data-Driven Network Security (Hardcover): Brij B. Gupta Advances in Malware and Data-Driven Network Security (Hardcover)
Brij B. Gupta
R5,784 Discovery Miles 57 840 Ships in 10 - 15 working days

Every day approximately three-hundred thousand to four-hundred thousand new malware are registered, many of them being adware and variants of previously known malware. Anti-virus companies and researchers cannot deal with such a deluge of malware - to analyze and build patches. The only way to scale the efforts is to build algorithms to enable machines to analyze malware and classify and cluster them to such a level of granularity that it will enable humans (or machines) to gain critical insights about them and build solutions that are specific enough to detect and thwart existing malware and generic-enough to thwart future variants. Advances in Malware and Data-Driven Network Security comprehensively covers data-driven malware security with an emphasis on using statistical, machine learning, and AI as well as the current trends in ML/statistical approaches to detecting, clustering, and classification of cyber-threats. Providing information on advances in malware and data-driven network security as well as future research directions, it is ideal for graduate students, academicians, faculty members, scientists, software developers, security analysts, computer engineers, programmers, IT specialists, and researchers who are seeking to learn and carry out research in the area of malware and data-driven network security.

#Myprivacy #Myright - Protect It While You Can (Hardcover): Robin M Singh #Myprivacy #Myright - Protect It While You Can (Hardcover)
Robin M Singh
R565 Discovery Miles 5 650 Ships in 12 - 19 working days
The Cybersecurity Mindset - A Virtual and Transformational Thinking Mode (Hardcover): Dewayne Hart The Cybersecurity Mindset - A Virtual and Transformational Thinking Mode (Hardcover)
Dewayne Hart
R784 Discovery Miles 7 840 Ships in 12 - 19 working days
Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R7,930 Discovery Miles 79 300 Ships in 10 - 15 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

Advancements in Security and Privacy Initiatives for Multimedia Images (Hardcover): Ashwani Kumar, Seelam Sai Satyanarayana... Advancements in Security and Privacy Initiatives for Multimedia Images (Hardcover)
Ashwani Kumar, Seelam Sai Satyanarayana Reddy
R6,425 Discovery Miles 64 250 Ships in 10 - 15 working days

The use of digital images in today's modernized market is rapidly increasing throughout organizations due to the prevalence of social media and digital content. Companies who wish to distribute their content over the internet face numerous security risks such as copyright violation. Advanced methods for the protection and security of digital data are constantly emerging, and up-to-date research in this area is lacking. Advancements in Security and Privacy Initiatives for Multimedia Images is a collection of innovative research on the methods and applications of contemporary techniques for the security and copyright protection of images and their distribution. While highlighting topics including simulation-based security, digital watermarking protocols, and counterfeit prevention, this book is ideally designed for security analysts, researchers, developers, programmers, academicians, practitioners, students, executives, educators, and policymakers seeking current research on modern security improvements for multimedia images.

Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most... Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs (Hardcover)
Alex Wagner
R1,606 R1,331 Discovery Miles 13 310 Save R275 (17%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
International Encyclopedia of…
Roger Vickerman Hardcover R84,266 Discovery Miles 842 660
Efficient Integration of 5G and Beyond…
Zi-Yang Wu, Muhammad Ismail, … Hardcover R1,521 Discovery Miles 15 210
Emerging Spatial Information Systems and…
Hardcover R2,729 Discovery Miles 27 290
5G NR - The Next Generation Wireless…
Erik Dahlman, Stefan Parkvall, … Paperback R2,188 Discovery Miles 21 880
Gardening with Keith Kirsten
Keith Kirsten Paperback R370 R250 Discovery Miles 2 500
But Why Is Mommy in Jail?
Erika Ruiz Hardcover R626 Discovery Miles 6 260
Further Developments in Fractals and…
Julien Barral, Stephane Seuret Hardcover R3,618 Discovery Miles 36 180
Magda - My Journey
Magda Wierzycka Paperback R350 R323 Discovery Miles 3 230
Limit Theorems and Applications of…
Shoumei Li, Y. Ogura, … Hardcover R3,111 Discovery Miles 31 110
Wireless Public Safety Networks Volume 1…
Daniel Camara, Navid Nikaein Hardcover R4,133 R2,839 Discovery Miles 28 390

 

Partners