![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Network security
This book serves as a security practitioner s guide to today s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms. Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding Chapter Review Questions/Exercises and Case Studies Ancillaries: Solutions Manual; slide package; figure files This format will be attractive to universities and career
schools as well as federal and state agencies, corporate security
training programs, ASIS certification, etc.
Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective, underlying theories, modelling, and the applications of Cyber Physical Systems (CPS). It aims to cover all topics ranging from discussion of ru-diments of the system, efficient management, to recent research challenges and issues. Editors aim to present the book in a self-sufficient manner and to achieve this, the book has been edited to include all the aspects of CPS. The book fo-cuses on the concept map of CPS including latest technological interventions; issues, challenges, and the integration of CPS with IoT & Big Data Analytics. This aims to bring together unique contributions on cyber-physical systems research and education with applications in industrial, agriculture, and medical domains. The main aim of the book is to provide a roadmap to the latest advancements to provide optimal solutions in the field of CPS. Features * Coverage of rudiments of the subject * Discussion of recent advancements in the associated field * Considers an audience of diverse domains * Suitable for students (both UG and PG level) and researchers in the field of CPS This book aims to present the emergence of Cyber Physical Systems in response to revolutionary advancements in IoT. While discussing the associated challenges, it also endeavors to devise efficient models which are competent to address these challenges. This book aims to cater to researchers and academicians working in the related field of CPS.
Introduction to the Cyber-Ranges aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing cyber ranges in leading urban sectors like military, academic and commercial. * Provides foundational know-how of Cyber Ranges, their types, roles * Focuses on architectural design * Presents a comparison between emulation and simulation Cyber Ranges * Discusses various use cases of exiting cyber ranges in Military, Academics and Commercial arenas
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.
The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given equipment that has not been properly secured or must use personal devices to perform office work. The proliferation of videoconferencing has brought about new types of cyber-attacks. When the pandemic struck, many organizations found they had no, or old and unworkable, business continuity and disaster recovery plans. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic reviews the COVID-19 pandemic and related information security issues. It then develops a series of lessons learned from this reviews and explains how organizations can prepare for the next global mega disaster. The following presents some of the key lessons learned: The lack of vetting for third party suppliers and vendors The lack of controls surrounding data privacy, especially as it relates to the personal identifiable information (PPI) data sets The intermingling of home and corporate networks The lack of a secure remote workforce The emergence of supply chain attacks (e.g., Solar Winds) To address the issues raised in these lessons learned, CISOs and their security teams must have tools and methodologies in place to address the following: The need for incident response, disaster recovery, and business continuity plans The need for effective penetration testing The importance of threat hunting The need for endpoint security The need to use the SOAR model The importance of a zero-trust framework This book provides practical coverage of these topics to prepare information security professionals for any type of future disaster. The COVID-19 pandemic has changed the entire world to unprecedented and previously unimaginable levels. Many businesses, especially in the United States, were completely caught off guard, and they had no concrete plans put into place, from a cybersecurity standpoint, for how to deal with this mega disaster. This how-to book fully prepares CIOs, CISOs, and their teams for the next disaster, whether natural or manmade, with the various lessons that have been learned thus far from the COVID-19 pandemic.
The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given equipment that has not been properly secured or must use personal devices to perform office work. The proliferation of videoconferencing has brought about new types of cyber-attacks. When the pandemic struck, many organizations found they had no, or old and unworkable, business continuity and disaster recovery plans. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic reviews the COVID-19 pandemic and related information security issues. It then develops a series of lessons learned from this reviews and explains how organizations can prepare for the next global mega disaster. The following presents some of the key lessons learned: The lack of vetting for third party suppliers and vendors The lack of controls surrounding data privacy, especially as it relates to the personal identifiable information (PPI) data sets The intermingling of home and corporate networks The lack of a secure remote workforce The emergence of supply chain attacks (e.g., Solar Winds) To address the issues raised in these lessons learned, CISOs and their security teams must have tools and methodologies in place to address the following: The need for incident response, disaster recovery, and business continuity plans The need for effective penetration testing The importance of threat hunting The need for endpoint security The need to use the SOAR model The importance of a zero-trust framework This book provides practical coverage of these topics to prepare information security professionals for any type of future disaster. The COVID-19 pandemic has changed the entire world to unprecedented and previously unimaginable levels. Many businesses, especially in the United States, were completely caught off guard, and they had no concrete plans put into place, from a cybersecurity standpoint, for how to deal with this mega disaster. This how-to book fully prepares CIOs, CISOs, and their teams for the next disaster, whether natural or manmade, with the various lessons that have been learned thus far from the COVID-19 pandemic.
The Global South is recognized as one of the fastest growing regions in terms of Internet population as well as the region that accounts for the majority of Internet users. However, It cannot be overlooked that with increasing connectivity to and dependence on Internet-based platforms and services, so too is the potential increased for information and cybersecurity threats and attacks. Further, it has long been established that micro, small, and medium enterprises (MSMEs) play a key role in national economies, serving as important drivers of economic growth in Global South economies. Yet, little is known about information security, cybersecurity and cybercrime issues and strategies contextualized to these developing economies and MSMEs. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience examines the prevalence, nature, trends and impacts of cyber-related incidents on Global South economies. It further explores cybersecurity challenges, potential threats, and risks likely faced by MSMEs and governments of the Global South. A major thrust of this book is to offer tools, techniques, and legislative frameworks that can improve the information, data, and cybersecurity posture of Global South governments and MSMEs. It also provides evidence-based best practices and strategies relevant to the business community and general Information Communication Technology (ICT) users in combating and preventing cyber-related incidents. Also examined in this book are case studies and experiences of the Global South economies that can be used to enhance students' learning experience. Another important feature of this book is that it outlines a research agenda to advance the scholarship of information and cybersecurity in the Global South. Features: Cybercrime in the Caribbean Privacy and security management Cybersecurity compliance behaviour Developing solutions for managing cybersecurity risks Designing an effective cybersecurity programme in the organization for improved resilience The cybersecurity capability maturity model for sustainable security advantage Cyber hygiene practices for MSMEs A cybercrime classification ontology
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. With X-Ways Forensics Practitioner's Guide, you will be able to
use X-Ways Forensics to its fullest potential without any
additional training. The book takes you from installation to the
most advanced features of the software. Once you are familiar with
the basic components of X-Ways, the authors demonstrate
never-before-documented features using real life examples and
information on how to present investigation results. The book
culminates with chapters on reporting, triage and preview methods,
as well as electronic discovery and cool X-Ways apps.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need. You have probably noticed that blockchains are growing in popularity. Governments are investigating Digital Currencies, supply chains are adopting Digital Ledgers, games makers and artists are developing NFTs (Non-Fungible Tokens), and new use-cases are emerging regularly. With such growth, many people will find themselves needing to understand how these technologies work. There will be new project teams, with technical leads managing blockchain projects and developers creating distributed applications. This book is great for them as it explains the concepts on which blockchain technologies are based, in simple terms. We will discuss and explain topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms encryption, vulnerabilities, and much more. The structures and principles described will be relevant for developers and managers alike, and will be demonstrated through relevant examples throughout the text. If you are looking to understand this exciting new technology, this is the book for you.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need. You have probably noticed that blockchains are growing in popularity. Governments are investigating Digital Currencies, supply chains are adopting Digital Ledgers, games makers and artists are developing NFTs (Non-Fungible Tokens), and new use-cases are emerging regularly. With such growth, many people will find themselves needing to understand how these technologies work. There will be new project teams, with technical leads managing blockchain projects and developers creating distributed applications. This book is great for them as it explains the concepts on which blockchain technologies are based, in simple terms. We will discuss and explain topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms encryption, vulnerabilities, and much more. The structures and principles described will be relevant for developers and managers alike, and will be demonstrated through relevant examples throughout the text. If you are looking to understand this exciting new technology, this is the book for you.
"Emerging Trends in ICT Security, " an edited volume, discusses
the foundations and theoretical aspects of ICT security;
coverstrends, analytics, assessments and frameworks necessary for
performance analysis and evaluation; and gives you the
state-of-the-art knowledge needed for successful deployment of
security solutions in many environments. Application scenarios
provide you with an insider s look at security solutions deployed
in real-life scenarios, including but limited to smart devices,
biometrics, social media, big data security, and crowd
sourcing.
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. "Cloud Storage Forensics" presents the first evidence-based
cloud forensic framework. Using three popular cloud storage
services and one private cloud storage service as case studies, the
authors show you how their framework can be used to undertake
research into the data remnants on both cloud storage servers and
client devices when a user undertakes a variety of methods to
store, upload, and access data in the cloud. By determining the
data remnants on client devices, you gain a better understanding of
the types of terrestrial artifacts that are likely to remain at the
Identification stage of an investigation. Once it is determined
that a cloud storage service account has potential evidence of
relevance to an investigation, you can communicate this to legal
liaison points within service providers to enable them to respond
and secure evidence in a timely manner.
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. This book explores the variegated perspectives of security in the complex context of Internet of Things. It also aims to present the changing face of security, from the ubiquitous networks comprising of WSN as the lowest layer, to the enabler apps working as bridge between the users and the complex IoT system. It takes a closer look at the different types of security schemes required to fit in the heterogeneous nature of IoT network., whilst the readers are also introduced to basic attacks targeting an IoT network, as well as specific types of security schemes worked out by researchers across different countries. As Programmable Logic Controllers (PLC) play a fundamental role in Industrial Control Systems, since they provide various functionalities of physical tools by collecting data from input devices and sending commands to output devices, this book includes a discussion on the security considerations of extending a PLC-based system with IoT capabilities. Other advanced topics include: The machine ethics aspects in the IoT system; the Intrusion detection of WSN; and the methods of securing the user from privacy breaches due to the overprivileged IoT apps. This book will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.
This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on online political platforms. The elaborated components are exemplarily based on the needs of a political platform implemented during the presidential election in Ecuador. The book readdresses the issue of privacy paradox demonstrating that, indeed, users' actual decisions of being private in most cases diverge with their initial privacy intentions. The two concepts presented in the book - the citizen privacy profile framework and the prototype fuzzy-based privacy settings recommender system - can be adapted by different organizations such as government institutions, NGOs, or private online service providers to meet their specific needs. The book will be of interest to researchers and practitioners in the areas of usage modeling, privacy, system design, and for service providers in eDemocracy.
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.
"Managing Information Security" offers focused coverage of how
to protect mission critical systems, and how to deploy security
management systems, IT security, ID management, intrusion detection
and prevention systems, computer forensics, network forensics,
firewalls, penetration testing, vulnerability assessment, and more.
It offers in-depth coverage of the current technology and practice
as it relates to information security management solutions.
Individual chapters are authored by leading experts in the field
and address the immediate and long-term challenges in the authors
respective areas of expertise.
Many people think of the Smart Grid as a power distribution group built on advanced smart metering but that s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire
Smart Grid, with recommended cyber security measures for everything
from the supply chain to the consumer.
The RMF allows an organization to develop an organization-wide
risk framework that reduces the resources required to authorize a
systems operation. Use of the RMF will help organizations maintain
compliance with not only FISMA and OMB requirements but can also be
tailored to meet other compliance requirements such as Payment Card
Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST
SP 800-37 in 2010 and the move of the Intelligence Community and
Department of Defense to modified versions of this process, clear
implementation guidance is needed to help individuals correctly
implement this process. No other publication covers this topic in
the detail provided in this book or provides hands-on exercises
that will enforce the topics. Examples in the book follow a
fictitious organization through the RMF, allowing the reader to
follow the development of proper compliance measures. Templates
provided in the book allow readers to quickly implement the RMF in
their organization. The need for this book continues to expand as
government and non-governmental organizations build their security
programs around the RMF. The companion website provides access to
all of the documents, templates and examples needed to not only
understand the RMF but also implement this process in the reader s
own organization. A comprehensive case study from initiation to decommission and disposal Detailed explanations of the complete RMF process and its linkage to the SDLC Hands on exercises to reinforce topics Complete linkage of the RMF to all applicable laws, regulations and publications as never seen before "
Addresses the knowledge for emerging multidisciplinary research Explores basic and high level concepts and serves as a manual for industry Presents security and privacy issues through IoT ecosystems and its implications to the real-world Explains concepts of IoT related technologies, trends, and future directions related to information security Examines privacy issues and challenges related to data-intensive technologies in IoT
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations
In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion on cyber matters at national and international levels has focused primarily on the topics of law, policy, and strategy. The objective of these efforts is typically to promote security by establishing agreements among stakeholders on regulatory activities. Varying levels of investment in cyberspace, however, comes with varying levels of risk; in some ways, this can translate directly to the degree of emphasis for pushing substantial change. At the very foundation or root of cyberspace systems and processes are tenets and rules governed by principles in mathematics. Topics such as encrypting or decrypting file transmissions, modeling networks, performing data analysis, quantifying uncertainty, measuring risk, and weighing decisions or adversarial courses of action represent a very small subset of activities highlighted by mathematics. To facilitate education and a greater awareness of the role of mathematics in cyber systems and processes, a description of research in this area is needed. Mathematics in Cyber Research aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies. Features One of the only books to bring together such a diverse and comprehensive range of topics within mathematics and apply them to cyber research. Suitable for college undergraduate students or educators that are either interested in learning about cyber-related mathematics or intend to perform research within the cyber domain. The book may also appeal to practitioners within the commercial or government industry sectors. Most national and international venues for collaboration and discussion on cyber matters have focused primarily on the topics of law, policy, strategy, and technology. This book is among the first to address the underpinning mathematics. |
You may like...
Policies for a carbon-neutral industry…
Organisation for Economic Cooperation and Development
Paperback
R2,853
Discovery Miles 28 530
Research Anthology on Strategies for…
Information R Management Association
Hardcover
R13,711
Discovery Miles 137 110
Blind Spot - Illuminating the Hidden…
Steve Diller, Nathan Shedroff, …
Paperback
R909
Discovery Miles 9 090
Norway 2022
Organisation for Economic Cooperation and Development
Paperback
R1,259
Discovery Miles 12 590
Handbook of Research on Innovation and…
Mohammad Nabil Almunawar, Muhammad Anshari Ali, …
Hardcover
R6,165
Discovery Miles 61 650
Green Composites - Waste and…
Caroline Baillie, Randika Jayasinghe
Hardcover
R4,665
Discovery Miles 46 650
|