0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (245)
  • R250 - R500 (555)
  • R500+ (5,231)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The Science of Quantitative Information Flow (Hardcover, 1st ed. 2020): Mario S. Alvim, Konstantinos Chatzikokolakis, Annabelle... The Science of Quantitative Information Flow (Hardcover, 1st ed. 2020)
Mario S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, …
R1,953 Discovery Miles 19 530 Ships in 10 - 15 working days

This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively - so bringing precise meaning to the intuition that certain information leaks are small enough to be tolerated - and how systems can be constructed that achieve rigorous, quantitative information-flow guarantees in those terms. It addresses the fundamental challenge that functional and practical requirements frequently conflict with the goal of preserving confidentiality, making perfect security unattainable. Topics include: a systematic presentation of how unwanted information flow, i.e., "leaks", can be quantified in operationally significant ways and then bounded, both with respect to estimated benefit for an attacking adversary and by comparisons between alternative implementations; a detailed study of capacity, refinement, and Dalenius leakage, supporting robust leakage assessments; a unification of information-theoretic channels and information-leaking sequential programs within the same framework; and a collection of case studies, showing how the theory can be applied to interesting realistic scenarios. The text is unified, self-contained and comprehensive, accessible to students and researchers with some knowledge of discrete probability and undergraduate mathematics, and contains exercises to facilitate its use as a course textbook.

Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Hardcover, 1st ed. 2022): Anubhab Baksi Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Hardcover, 1st ed. 2022)
Anubhab Baksi
R4,329 Discovery Miles 43 290 Ships in 12 - 17 working days

This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse-it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography.

Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Paperback): Richard Warner, Robert Sloan Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Paperback)
Richard Warner, Robert Sloan
R766 Discovery Miles 7 660 Ships in 12 - 17 working days

The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

An Introduction to IoT Analytics (Paperback): Harry G. Perros An Introduction to IoT Analytics (Paperback)
Harry G. Perros
R1,606 Discovery Miles 16 060 Ships in 12 - 17 working days

This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.

An Introduction to IoT Analytics (Hardcover): Harry G. Perros An Introduction to IoT Analytics (Hardcover)
Harry G. Perros
R3,822 Discovery Miles 38 220 Ships in 12 - 17 working days

This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.

Handbook of System Safety and Security - Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety,... Handbook of System Safety and Security - Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems (Hardcover)
Edward Griffor
R5,996 Discovery Miles 59 960 Ships in 10 - 15 working days

Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system's performance.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R3,912 Discovery Miles 39 120 Ships in 10 - 15 working days

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Dynamic Networks And Cyber-security (Hardcover): Niall M Adams, Nicholas A Heard Dynamic Networks And Cyber-security (Hardcover)
Niall M Adams, Nicholas A Heard
R2,819 Discovery Miles 28 190 Ships in 12 - 17 working days

As an under-studied area of academic research, the analysis of computer network traffic data is still in its infancy. However, the challenge of detecting and mitigating malicious or unauthorised behaviour through the lens of such data is becoming an increasingly prominent issue.This collection of papers by leading researchers and practitioners synthesises cutting-edge work in the analysis of dynamic networks and statistical aspects of cyber security. The book is structured in such a way as to keep security application at the forefront of discussions. It offers readers easy access into the area of data analysis for complex cyber-security applications, with a particular focus on temporal and network aspects.Chapters can be read as standalone sections and provide rich reviews of the latest research within the field of cyber-security. Academic readers will benefit from state-of-the-art descriptions of new methodologies and their extension to real practical problems while industry professionals will appreciate access to more advanced methodology than ever before.

Cyber Deception - Techniques, Strategies, and Human Aspects (Hardcover, 1st ed. 2023): Tiffany Bao, Milind Tambe, Cliff Wang Cyber Deception - Techniques, Strategies, and Human Aspects (Hardcover, 1st ed. 2023)
Tiffany Bao, Milind Tambe, Cliff Wang
R4,564 Discovery Miles 45 640 Ships in 10 - 15 working days

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human's cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human's behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Cybersecurity Lessons from CoVID-19 (Hardcover): Robert Slade Cybersecurity Lessons from CoVID-19 (Hardcover)
Robert Slade
R1,595 Discovery Miles 15 950 Ships in 12 - 17 working days

Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business. Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book. Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.

Information Security and Optimization (Hardcover): Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta Information Security and Optimization (Hardcover)
Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
R3,494 Discovery Miles 34 940 Ships in 12 - 17 working days

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

Security and Organization within IoT and Smart Cities (Hardcover): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Hardcover)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R2,218 Discovery Miles 22 180 Ships in 12 - 17 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R2,103 Discovery Miles 21 030 Ships in 9 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Applied Information Security - A Hands-on Approach (Hardcover, 2011): David Basin, Patrick Schaller, Michael Schlapfer Applied Information Security - A Hands-on Approach (Hardcover, 2011)
David Basin, Patrick Schaller, Michael Schlapfer
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments that may be carried out by the reader using accompanying software. The experiments highlight key information security problems that arise in modern operating systems, networks, and web applications. The authors explain how to identify and exploit such problems and they show different countermeasures and their implementation. The reader thus gains a detailed understanding of how vulnerabilities arise and practical experience tackling them. After presenting the basics of security principles, virtual environments, and network services, the authors explain the core security principles of authentication and access control, logging and log analysis, web application security, certificates and public-key cryptography, and risk management. The book concludes with appendices on the design of related courses, report templates, and the basics of Linux as needed for the assignments. The authors have successfully taught IT security to students and professionals using the content of this book and the laboratory setting it describes. The book can be used in undergraduate or graduate laboratory courses, complementing more theoretically oriented courses, and it can also be used for self-study by IT professionals who want hands-on experience in applied information security. The authors' supporting software is freely available online and the text is supported throughout with exercises.

Enhancing Business Continuity and IT Capability - System Administration and Server Operating Platforms (Hardcover): Nijaz... Enhancing Business Continuity and IT Capability - System Administration and Server Operating Platforms (Hardcover)
Nijaz Bajgoric, Lejla Turulja, Semir Ibrahimovic, Amra Alagic
R3,035 Discovery Miles 30 350 Ships in 12 - 17 working days

Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company's information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm's performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book.

Forensic Document Examination in the 21st Century (Hardcover): Miriam Angel, Jan Seaman Kelly Forensic Document Examination in the 21st Century (Hardcover)
Miriam Angel, Jan Seaman Kelly
R3,517 Discovery Miles 35 170 Ships in 12 - 17 working days

Forensic Document Examination in the 21st Century covers the latest technology and techniques providing a complete resource on contemporary issues and methods in forensic document examination. Forensic document examiners provide their findings as expert testimony in court. Due to rapid changes in technology, including digital documents, printing and photocopying capabilities, and more, there is a great need for this up-to-date reference. The examination of documents can include comparison of handwriting or hand-printing; detection of alterations or photocopier and computer manipulation; restoration or decipherment of erased and obliterated writing; visualization of latent impressions; the identification of printing processes; and differentiation of inks. Computer-generated documents are prevalent, and electronically-captured signatures are becoming more widespread, meaning the knowledge of advances in technology and adoption of new validated techniques and methods of document examination are crucial to the reliability of forensic opinions. Forensic Document Examination in the 21st Century includes the latest research on the subject and with contributions from leading experts on their various areas of expertise. The book will be a welcome addition to the literature and support the foundational basis for methods and procedures for use it expert testimony in court, serving as a resource for forensic document examiners, trainees, and those in the criminal and legal communities who use the services of expert document examiners and witnesses

Security and Software for Cybercafes (Hardcover): Esharenana E. Adomi Security and Software for Cybercafes (Hardcover)
Esharenana E. Adomi
R5,209 Discovery Miles 52 090 Ships in 12 - 17 working days

Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery. Security and Software for Cybercafes provides relevant theoretical frameworks and current empirical research findings on the security measures and software necessary for cybercafes, offering information technology professionals, scholars, researchers, and educators detailed knowledge and understanding of this innovative and leading-edge issue, both in industrialized and developing countries.

Intrusion Detection and Correlation - Challenges and Solutions (Hardcover, 2005 ed.): Christopher Kruegel, Fredrik Valeur,... Intrusion Detection and Correlation - Challenges and Solutions (Hardcover, 2005 ed.)
Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
R3,098 Discovery Miles 30 980 Ships in 10 - 15 working days

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography.

The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the services they provide. Intrusion detection systems (IDSs) take increased pounding for failing to meet the expectations researchers and IDS vendors continually raise. Promises that IDSs are capable of reliably identifying malicious activity in large networks were premature and never tuned into reality.

While virus scanners and firewalls have visible benefits and remain virtually unnoticed during normal operations, the situation is different with intrusion detection sensors. State-of-the-art IDSs produce hundreds or even thousands of alerts every day. Unfortunately, almost all of these alerts are false positives, that is, they are not related to security-relevant incidents.

Intrusion Detection and Correlation: Challenges and Solutions analyzes the challenges in interpreting and combining (i.e., correlating) alerts produced by these systems. In addition, existing academic and commercial systems are classified; their advantage and shortcomings are presented, especially in the case of deployment in large, real-world sites.

Sarbanes-Oxley Guide for Finance and Information Technology Professionals 2e (Hardcover, 2nd Edition): S. Anand Sarbanes-Oxley Guide for Finance and Information Technology Professionals 2e (Hardcover, 2nd Edition)
S. Anand
R1,792 Discovery Miles 17 920 Ships in 10 - 15 working days

Praise for "Sarbanes-Oxley Guide for Finance and Information Technology Professionals"

"Effective SOX programs enlist the entire organization to build and monitor a compliant control environment. However, even the best SOX programs are inefficient at best, ineffective at worst, if there is a lack of informed, competent finance and IT personnel to support the effort. This book provides these important professionals a needed resource for and road map toward successfully implementing their SOX initiative."
--Scott Green Chief Administrative Officer, Weil, Gotshal & Manges LLP and author, "Sarbanes-Oxley and the Board of Directors"

"As a former CFO and CIO, I found this book to be an excellent synopsis of SOX, with impressive implementation summaries and checklists."
--Michael P. Cangemi CISA, Editor in Chief, "Information Systems Control Journal" and author, "Managing the Audit Function"

"An excellent introduction to the Sarbanes-Oxley Act from the perspective of the financial and IT professionals that are on the front lines of establishing compliance in their organizations. The author walks through many areas by asking 'what can go wrong' types of questions, and then outlines actions that should be taken as well as the consequences of noncompliance. This is a good book to add to one's professional library "
--Robert R. Moeller Author, "Sarbanes-Oxley and the New Internal Auditing Rules"

"Mr. Anand has compiled a solid overview of the control systems needed for not only accounting systems, but also the information technologies that support those systems. Among the Sarbanes books on the market, his coverage of both topics is unique."
--Steven M. Bragg Author, "Accounting Best Practices"

"An excellent overview of the compliance process. A must-read for anyone who needs to get up to speed quickly with Sarbanes-Oxley."
--Jack Martin Publisher, "Sarbanes-Oxley Compliance Journal"

Security in Wireless Communication Networks (Hardcover): Y. Qian Security in Wireless Communication Networks (Hardcover)
Y. Qian
R2,776 Discovery Miles 27 760 Ships in 12 - 17 working days

Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field Security in Wireless Communication Networksdelivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks, encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems. The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast nature of the system, with all of its inherent harshness and interference. Readers will learn: A comprehensive introduction to the background of wireless communication network security, including a broad overview of wireless communication networks, security services, the mathematics crucial to the subject, and cryptographic techniques An exploration of wireless local area network security, including Bluetooth security, Wi-Fi security, and body area network security An examination of wide area wireless network security, including treatments of 2G, 3G, and 4G Discussions of future development in wireless security, including 5G, and vehicular ad-hoc network security Perfect for undergraduate and graduate students in programs related to wireless communication, Security in Wireless Communication Networks will also earn a place in the libraries of professors, researchers, scientists, engineers, industry managers, consultants, and members of government security agencies who seek to improve their understanding of wireless security protocols and practices.

Reinforcement Learning for Cyber-Physical Systems - with Cybersecurity Case Studies (Paperback): Chong Li, Meikang Qiu Reinforcement Learning for Cyber-Physical Systems - with Cybersecurity Case Studies (Paperback)
Chong Li, Meikang Qiu
R1,888 R1,494 Discovery Miles 14 940 Save R394 (21%) Ships in 12 - 17 working days

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.

A History of Cyber Security Attacks - 1980 to Present (Paperback): Bruce Middleton A History of Cyber Security Attacks - 1980 to Present (Paperback)
Bruce Middleton
R1,461 Discovery Miles 14 610 Ships in 9 - 15 working days

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,519 Discovery Miles 15 190 Ships in 12 - 17 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Practical Cloud Security - A Cross-Industry View (Paperback): Kevin L. Jackson, Melvin B. Greer Jr. Practical Cloud Security - A Cross-Industry View (Paperback)
Kevin L. Jackson, Melvin B. Greer Jr.
R1,488 Discovery Miles 14 880 Ships in 12 - 17 working days

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features * Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned * Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies * Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements

Security in the Private Cloud (Paperback): John R Vacca Security in the Private Cloud (Paperback)
John R Vacca
R1,579 Discovery Miles 15 790 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sears in Chicago - A Century of Memories
Val Perry Rendel Paperback R548 R501 Discovery Miles 5 010
The Compassionate Court? - Support…
Corey S. Shdaimah, Chrysanthi S. Leon, … Hardcover R2,223 Discovery Miles 22 230
Steinheist - Markus Jooste, Steinhoff…
Rob Rose Paperback  (1)
R395 R370 Discovery Miles 3 700
Computational Linear and Commutative…
Martin Kreuzer, Lorenzo Robbiano Hardcover R2,681 Discovery Miles 26 810
Multiobjective Linear and Integer…
Carlos Henggeler Antunes, Maria Joao Alves, … Hardcover R3,941 Discovery Miles 39 410
Topological Methods in Complementarity…
G. Isac Hardcover R6,023 Discovery Miles 60 230
Engineering Ethics for a Globalized…
Colleen Murphy, Paolo Gardoni, … Hardcover R3,052 Discovery Miles 30 520
Opting in to Optimization - How…
R Jon MacDonald Hardcover R666 R602 Discovery Miles 6 020
Linear Algebra
Shen, L., Wang, Haohao, … Hardcover R2,370 R1,875 Discovery Miles 18 750
Being Jewish After The Destruction Of…
Peter Beinart Hardcover R671 R549 Discovery Miles 5 490

 

Partners