0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (210)
  • R250 - R500 (607)
  • R500+ (5,105)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The Global Cyber-Vulnerability Report (Hardcover, 1st ed. 2015): V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya... The Global Cyber-Vulnerability Report (Hardcover, 1st ed. 2015)
V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya Prakash
R3,671 R3,410 Discovery Miles 34 100 Save R261 (7%) Ships in 10 - 15 working days

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.

Placing the Suspect Behind the Keyboard - Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects... Placing the Suspect Behind the Keyboard - Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects (Paperback, New)
Brett Shavers
R1,207 Discovery Miles 12 070 Ships in 10 - 15 working days

"Placing the Suspect Behind the Keyboard" is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals.

Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.

Learn the tools and investigative principles of both physical and digital cybercrime investigations-and how they fit together to build a solid and complete case.

Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard."

The only book to combine physical and digital investigative techniques. "

Cybersecurity for eHealth - A Simplified Guide to Practical Cybersecurity for Non-Technical Healthcare Stakeholders &... Cybersecurity for eHealth - A Simplified Guide to Practical Cybersecurity for Non-Technical Healthcare Stakeholders & Practitioners (Paperback)
Emmanuel C. Ogu
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient. It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book Distills foundational knowledge and presents it in a concise manner that is easily assimilated Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including Threat categories, agents, and objectives Strategies and approaches deployed by various threat agents Predisposing risk factors in cybersecurity threat situations Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth. Who should use this book? Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare

Cybersecurity for eHealth - A Simplified Guide to Practical Cybersecurity for Non-Technical Healthcare Stakeholders &... Cybersecurity for eHealth - A Simplified Guide to Practical Cybersecurity for Non-Technical Healthcare Stakeholders & Practitioners (Hardcover)
Emmanuel C. Ogu
R3,774 Discovery Miles 37 740 Ships in 10 - 15 working days

The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient. It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book Distills foundational knowledge and presents it in a concise manner that is easily assimilated Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including Threat categories, agents, and objectives Strategies and approaches deployed by various threat agents Predisposing risk factors in cybersecurity threat situations Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth. Who should use this book? Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare

Network Security - Current Status and Future Directions (Hardcover): C Douligeris Network Security - Current Status and Future Directions (Hardcover)
C Douligeris
R3,213 Discovery Miles 32 130 Ships in 18 - 22 working days

A unique overview of network security issues, solutions, and methodologies at an architectural and research level
Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more.
Leading authorities in the field provide reliable information on the current state of security protocols, architectures, implementations, and policies. Contributors analyze research activities, proposals, trends, and state-of-the-art aspects of security and provide expert insights into the future of the industry.
Complete with strategies for implementing security mechanisms and techniques, Network Security features:
*
State-of-the-art technologies not covered in other books, such as Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) attacks and countermeasures
*
Problems and solutions for a wide range of network technologies, from fixed point to mobile
*
Methodologies for real-time and non-real-time applications and protocols

Nuclear Non-proliferation and Arms Control Verification - Innovative Systems Concepts (Hardcover, 1st ed. 2020): Irmgard... Nuclear Non-proliferation and Arms Control Verification - Innovative Systems Concepts (Hardcover, 1st ed. 2020)
Irmgard Niemeyer, Mona Dreicer, Gotthard Stein
R4,981 Discovery Miles 49 810 Ships in 10 - 15 working days

This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.

Cognitive Radio - Computing Techniques, Network Security, and Challenges (Hardcover): Budati Anil Kumar, Peter Ho Chiung Ching,... Cognitive Radio - Computing Techniques, Network Security, and Challenges (Hardcover)
Budati Anil Kumar, Peter Ho Chiung Ching, Shuichi Torii
R3,351 Discovery Miles 33 510 Ships in 10 - 15 working days

The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that is yet to be addressed. To address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CRs include ensuring secure device operations and data transmission with advanced computing techniques. Successful development of CR systems will involve attainment of the following key objectives: Increasing the rate and capacity of CR-based networks How the power is utilized in CR hardware devices with CMOS circuits How the framework is needed in complex networks Vedic multipliers on CR networks Spatial analysis and clustering methods for traffic management To transmit a large volume of data like video compression Swarm optimization algorithms Resource sharing in peer-to-peer networking This book gathers the latest research works focusing on the issues, challenges, and solutions in the field of Cognitive Radio Networks, with various techniques. The chapters in this book will give solutions to the problems that Industry 4.0 faces, and will be an essential resource for scholars in all areas of the field.

Strong Security Governance through Integration and Automation - A Practical Guide to Building an Integrated GRC Framework for... Strong Security Governance through Integration and Automation - A Practical Guide to Building an Integrated GRC Framework for Your Organization (Hardcover)
Priti Sikdar
R2,155 Discovery Miles 21 550 Ships in 10 - 15 working days

This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the compliances. It sets a unique mechanism for monitoring controls and a dashboard to maintain the level of compliances. It aims at integration and automation to reduce the fatigue of frequent compliance audits and build a standard baseline of controls to comply with the applicable standards and regulations to which the organization is subject. It is a perfect reference book for professionals in the field of IT governance, risk management, and compliance. The book also illustrates the concepts with charts, checklists, and flow diagrams to enable management to map controls with compliances.

Cybersecurity in the Electricity Sector - Managing Critical Infrastructure (Hardcover, 1st ed. 2019): Rafal Leszczyna Cybersecurity in the Electricity Sector - Managing Critical Infrastructure (Hardcover, 1st ed. 2019)
Rafal Leszczyna
R4,249 Discovery Miles 42 490 Ships in 18 - 22 working days

This book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the electricity market, and cybersecurity standards that apply in that sector. He then offers a systematic approach to cybersecurity management, including new methods of cybersecurity assessment, cost evaluation and comprehensive defence. This monograph is suitable for practitioners, professionals, and researchers engaged in critical infrastructure protection.

Securing Mobile Devices and Technology (Hardcover): Kutub Thakur, Al-Sakib Khan Pathan Securing Mobile Devices and Technology (Hardcover)
Kutub Thakur, Al-Sakib Khan Pathan
R4,352 Discovery Miles 43 520 Ships in 10 - 15 working days

This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.

Artificial Intelligence in a Throughput Model - Some Major Algorithms (Paperback): Waymond Rodgers Artificial Intelligence in a Throughput Model - Some Major Algorithms (Paperback)
Waymond Rodgers
R2,255 Discovery Miles 22 550 Ships in 10 - 15 working days

Physical and behavioral biometric technologies such as fingerprinting, facial recognition, voice identification, etc. have enhanced the level of security substantially in recent years. Governments and corporates have employed these technologies to achieve better customer satisfaction. However, biometrics faces major challenges in reducing criminal, terrorist activities and electronic frauds, especially in choosing appropriate decision-making algorithms. To face this challenge, new developments have been made, that amalgamate biometrics with artificial intelligence (AI) in decision-making modeling. Advanced software algorithms of AI, processing information offered by biometric technology, achieve better results. This has led to growth in the biometrics technology industry, and is set to increase the security and internal control operations manifold. This book provides an overview of the existing biometric technologies, decision-making algorithms and the growth opportunity in biometrics. The book proposes a throughput model, which draws on computer science, economics and psychology to model perceptual, informational sources, judgmental processes and decision choice algorithms. It reviews how biometrics might be applied to reduce risks to individuals and organizations, especially when dealing with digital-based media.

Securing Mobile Devices and Technology (Paperback): Kutub Thakur, Al-Sakib Khan Pathan Securing Mobile Devices and Technology (Paperback)
Kutub Thakur, Al-Sakib Khan Pathan
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.

Campus Emergency Preparedness - Meeting ICS and NIMS Compliance (Paperback): Maureen Connolly Campus Emergency Preparedness - Meeting ICS and NIMS Compliance (Paperback)
Maureen Connolly
R1,133 Discovery Miles 11 330 Ships in 10 - 15 working days

An easily digestible guide, Campus Emergency Preparedness: Meeting ICS and NIMS Compliance helps you develop and organize emergency operation plans. It incorporates the key components recommended by the Federal Emergency Management Agency (FEMA) and the US Department of Education and outlines the roles and responsibilities of campus personnel before, during, and after an emergency. Events covered include chemical spills, toxic gas releases, terrorist attacks, active shooter events, pandemics, floods, hurricanes, tornados, fires, and other natural or man-made hazards. The information in this book is extracted from FEMA and US Department of Education documents and training, as well as concepts and strategies from a cross-section of college and university emergency plans. These resources have been melded together to provide you with strategies for protecting, preventing, mitigating, responding, and recovering from threats and hazards that may occur at an institute of higher education. The book aids you in creating emergency response plans that comply with standards set by the ICS and NIMS. Ultimately, these are all-hazards strategies that can be applied to all phases of campus emergency management with efficient coordination among all levels of campus administration. Safety in higher education institution campuses is a critical issue today in the wake of several events in recent years. Campus Emergency Preparedness helps you work toward creating a campus environment that is as safe as possible for your students, faculty, and staff. It is a valuable source for anticipating and handling a broad range of emergencies.

Inside Radio: An Attack and Defense Guide (Hardcover, 1st ed. 2018): Qing Yang, Lin Huang Inside Radio: An Attack and Defense Guide (Hardcover, 1st ed. 2018)
Qing Yang, Lin Huang
R2,533 Discovery Miles 25 330 Ships in 10 - 15 working days

This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.

Client-Side Attacks and Defense (Paperback, New): Sean Philip Oriyano, Robert Shimonski Client-Side Attacks and Defense (Paperback, New)
Sean Philip Oriyano, Robert Shimonski
R1,029 R774 Discovery Miles 7 740 Save R255 (25%) Ships in 10 - 15 working days

Individuals wishing to attack a company s network have found a new path of least resistance the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user s machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible.

The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education.
Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authorsLearn how to strengthen your network's host- and network-based defense against attackers' number one remote exploit the client-side attackDefend your network against attacks that target your company's most vulnerable asset the end user"

Federated Identity Primer (Paperback): Derrick Rountree Federated Identity Primer (Paperback)
Derrick Rountree
R594 Discovery Miles 5 940 Ships in 10 - 15 working days

Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In "Federated Identity Primer," Derrick Rountree

Explains the concepts of digital identity

Describes the technology behind and implementation of federated identity systems

Helps you decide if federated identity is good for your system or web service

Learn about Internet authentication

Learn about federated authentication

Learn about ADFS 2.0 "

Risk Control Theory Of Online Transactions (Hardcover): Changjun Jiang, Wangyang Yu Risk Control Theory Of Online Transactions (Hardcover)
Changjun Jiang, Wangyang Yu
R2,394 Discovery Miles 23 940 Ships in 18 - 22 working days

Online transaction has become an important part of the new economy and finance. At the same time, transaction payment fraud also presents an explosive trend.This unique compendium introduces risk control theories technologies of online transaction processes, and applies the traditional security technologies and advanced behavior authentication methods to the trustworthy guarantee of online transaction systems. The comprehensive volume also promotes the development of trustworthy online transaction theory and technologies.This useful reference text will benefit researchers in the field of computer science and technologies, as well as a research reference in the field of online transaction risk prevention and control.

Touchless Palmprint Recognition Systems (Hardcover, 2014 ed.): Angelo Genovese, Vincenzo Piuri, Fabio Scotti Touchless Palmprint Recognition Systems (Hardcover, 2014 ed.)
Angelo Genovese, Vincenzo Piuri, Fabio Scotti
R3,634 R1,881 Discovery Miles 18 810 Save R1,753 (48%) Ships in 10 - 15 working days

This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive books on palmprint recognition systems. It discusses the research literature and the most relevant industrial applications of palmprint biometrics, including the low-cost solutions based on webcams. The steps of biometric recognition are described in detail, including acquisition setups, algorithms, and evaluation procedures. Constraints and limitations of current palmprint recognition systems are analyzed and discussed. The authors also introduce innovative methods for touchless and less-constrained palmprint recognition, with the aim to make palmprint biometrics easier to use in practical, daily-life applications, and overcome the typical constraints and limitations described. Touchless Palmprint Recognition Systems targets professionals and researchers working in biometrics, image processing and three-dimensional reconstruction. Advanced-level students studying biometrics and computer science will also find this material valuable as a secondary text book or reference.

Blockchain for Information Security and Privacy (Hardcover): Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar... Blockchain for Information Security and Privacy (Hardcover)
Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar Shukla, Zelalem Sintayehu Shibeshi
R3,361 Discovery Miles 33 610 Ships in 10 - 15 working days

Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

Securing IoT in Industry 4.0 Applications with Blockchain (Hardcover): P Kaliraj Securing IoT in Industry 4.0 Applications with Blockchain (Hardcover)
P Kaliraj; T. Devi
R3,795 Discovery Miles 37 950 Ships in 10 - 15 working days

The Industry 4.0 revolution is changing the world around us. Artificial intelligence and machine learning, automation and robotics, big data, Internet of Things, augmented reality, virtual reality, and creativity are the tools of Industry 4.0. Improved collaboration is seen between smart systems and humans, which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4.0 Applications with Blockchain examines the role of IoT in Industry 4.0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications, architecture, technologies, tools, and programming languages. It then examines blockchain and cybersecurity, as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4.0 systems The evolution of the Industrial Internet of Things (IIoT), its proliferation and market share, and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT), including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications, including smart contracts, transferring financial instruments, and Public Key Infrastructure An overview of the structure and working of a blockchain, including the types, evolution, benefits, and applications of blockchain to industries A framework of technologies designed to shield networks, computers, and data from malware, vulnerabilities, and unauthorized activities An explanation of the automation system employed in industries along with its classification, functionality, flexibility, limitations, and applications

Cryptography in Constant Parallel Time (Hardcover, 2011): Benny Applebaum Cryptography in Constant Parallel Time (Hardcover, 2011)
Benny Applebaum
R3,355 R1,855 Discovery Miles 18 550 Save R1,500 (45%) Ships in 10 - 15 working days

Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth.

This book establishes, for the first time, the possibility of local implementations for many basic cryptographic primitives such as one-way functions, pseudorandom generators, encryption schemes and digital signatures. It also extends these results to other stronger notions of locality, and addresses a wide variety of fundamental questions about local cryptography. The author's related thesis was honorably mentioned (runner-up) for the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments.

The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are interested in parallel cryptography. It also introduces general techniques and tools which are likely to interest experts in the area.

Machine Learning and Cognitive Science Applications in Cyber Security (Hardcover): Muhammad Salman Khan Machine Learning and Cognitive Science Applications in Cyber Security (Hardcover)
Muhammad Salman Khan
R5,840 Discovery Miles 58 400 Ships in 18 - 22 working days

In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines of cognitive science applications have been found to have significant applications in the domain of cyber security. Machine Learning and Cognitive Science Applications in Cyber Security examines different applications of cognition that can be used to detect threats and analyze data to capture malware. Highlighting such topics as anomaly detection, intelligent platforms, and triangle scheme, this publication is designed for IT specialists, computer engineers, researchers, academicians, and industry professionals interested in the impact of machine learning in cyber security and the methodologies that can help improve the performance and reliability of machine learning applications.

AI in Cybersecurity (Hardcover, 1st ed. 2019): Leslie F Sikos AI in Cybersecurity (Hardcover, 1st ed. 2019)
Leslie F Sikos
R4,633 Discovery Miles 46 330 Ships in 10 - 15 working days

This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday's security incidents no longer enables experts to predict and prevent tomorrow's attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.

Cyber Breach Response That Actually Works - Organizational Approach to Managing Residual Risk (Paperback): A Gorecki Cyber Breach Response That Actually Works - Organizational Approach to Managing Residual Risk (Paperback)
A Gorecki
R983 R837 Discovery Miles 8 370 Save R146 (15%) Ships in 18 - 22 working days

You will be breached--the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars--in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise. This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you'll learn what drives cyber incident response and how to build effective incident response capabilities. Expert author Andrew Gorecki delivers a vendor-agnostic approach based on his experience with Fortune 500 organizations. Understand the evolving threat landscape and learn how to address tactical and strategic challenges to build a comprehensive and cohesive cyber breach response program Discover how incident response fits within your overall information security program, including a look at risk management Build a capable incident response team and create an actionable incident response plan to prepare for cyberattacks and minimize their impact to your organization Effectively investigate small and large-scale incidents and recover faster by leveraging proven industry practices Navigate legal issues impacting incident response, including laws and regulations, criminal cases and civil litigation, and types of evidence and their admissibility in court In addition to its valuable breadth of discussion on incident response from a business strategy perspective, Cyber Breach Response That Actually Works offers information on key technology considerations to aid you in building an effective capability and accelerating investigations to ensure your organization can continue business operations during significant cyber events.

Intelligent and Connected Vehicle Security (Hardcover): Jiajia Liu, Abderrahim Benslimane Intelligent and Connected Vehicle Security (Hardcover)
Jiajia Liu, Abderrahim Benslimane
R2,846 Discovery Miles 28 460 Ships in 10 - 15 working days

Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasingly being applied in ICVs, making them more intelligent and connected with devices surrounding the vehicles. However, although the versatile connection and information exchange among ICVs, external devices and human beings provides vehicles with a better and faster perception of surrounding environments and a better driving experience for users, they also create a series of intrusion portals for malicious attackers which threaten the safety of drivers and passengers. This book is concerned with the recognition and protection against such threats. Security for ICVs includes information across the fields of automobile engineering, artificial intelligence, computer, microelectronics, automatic control, communication technology, big data, edge/cloud computing and others. This book comprehensively and systematically introduces security threats to ICVs coming from automotive technology development, on-board sensors, vehicle networking, automobile communications, intelligent transportation, big data, cloud computing, etc. Then, through discussion of some typical automobile cyber-attack cases studies, readers will gain a deeper understanding of the working principle of ICVs, so that they can test vehicles more objectively and scientifically. In this way they will find the existence of vulnerabilities and security risks and take the corresponding protective measures to prevent malicious attacks. Technical topics discussed in the book include but are not limited to: Electronic Control Unit and Vehicular Bus Security; Intra-vehicle Communication Security; V2X Communication Security; VANET Security; Unmanned Driving Security and Navigation Deception

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Learning by Doing with National…
Jivan Shrikrishna Parab, Ingrid Anne Nazareth, … Paperback R1,573 Discovery Miles 15 730
Nature-Inspired Algorithms - For…
Krishn Kumar Mishra Hardcover R3,794 Discovery Miles 37 940
Hybrid Intelligent Systems for…
Anuradha D. Thakare, Shilpa Laddha, … Hardcover R4,000 Discovery Miles 40 000
Real-Time Embedded Systems - Open-Source…
Ivan Cibrario Bertolotti, Gabriele Manduchi Paperback R2,608 Discovery Miles 26 080
Hybrid Encryption Algorithms over…
Mai Helmy Shaheen Hardcover R3,588 Discovery Miles 35 880
Internet of Behaviors (IoB)
R. Dhaya, R. Kanthavel Hardcover R3,497 Discovery Miles 34 970
Practical Engineering Design
Maja Bystrom, Bruce Eisenstein Hardcover R5,666 Discovery Miles 56 660
Writing Successful Undergraduate…
Thomas Hainey, Gavin Baxter Hardcover R4,084 Discovery Miles 40 840
Applications of Mathematical Modeling…
Madhu Jain, Dinesh K. Sharma, … Hardcover R4,924 Discovery Miles 49 240
Shaping the Future of ICT - Trends in…
Ibrahiem M.M.El Emary, Anna Brzozowska Paperback R1,506 Discovery Miles 15 060

 

Partners