0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (604)
  • R500+ (5,312)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Cyber Insecurity - Navigating the Perils of the Next Information Age (Hardcover): Richard Harrison, Trey Herr Cyber Insecurity - Navigating the Perils of the Next Information Age (Hardcover)
Richard Harrison, Trey Herr; Foreword by Richard J. Danzig
R1,960 Discovery Miles 19 600 Ships in 12 - 19 working days

Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow-and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods. * Learn more at the book's website at http://www.cyberinsecuritybook.org

Information Governance and Security - Protecting and Managing Your Company's Proprietary Information (Paperback): John... Information Governance and Security - Protecting and Managing Your Company's Proprietary Information (Paperback)
John Iannarelli, Michael O'Shaughnessy
R1,095 Discovery Miles 10 950 Ships in 12 - 19 working days

Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of.

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R2,101 Discovery Miles 21 010 Ships in 12 - 19 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

Cyber Forensics - Examining Emerging and Hybrid Technologies (Hardcover): Albert J. Marcella Cyber Forensics - Examining Emerging and Hybrid Technologies (Hardcover)
Albert J. Marcella
R3,451 Discovery Miles 34 510 Ships in 12 - 19 working days

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

Blockchain and IoT Integration - Approaches and Applications (Hardcover): Kavita Saini Blockchain and IoT Integration - Approaches and Applications (Hardcover)
Kavita Saini
R3,132 Discovery Miles 31 320 Ships in 12 - 19 working days

As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems

Implementing Electronic Card Payment Systems (Hardcover): Cristian Radu Implementing Electronic Card Payment Systems (Hardcover)
Cristian Radu
R3,044 Discovery Miles 30 440 Ships in 10 - 15 working days

As magnetic stripe cards are being replaced by chip cards that offer consumers and businesses greater protection against fraud, a new standard for this debit/credit card technology is being introduced by Europay, MasterCard, and Visa (EMV). This cutting-edge, new book provides professionals with a comprehensive overview of the EMV chip solution and explains why more and more important industry players will be adopting this technology.

The book offers a better understanding of the security problems associated with magnetic stripe cards, and presents the business case for migrating to this new chip technology. Moreover, it shows professionals how to design a multi-application EMV chip card layout, and explains important implementation details for EMV chip cards and terminals. This first-of-its-kind resource also discusses the organizational and management issues in connection with the EMV chip migration and the use of EMV chip cards in e-commerce and m-commerce transactions.

Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International... Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers (Hardcover, 1st ed. 2016)
David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hubner, Charles Raab
R3,403 R2,152 Discovery Miles 21 520 Save R1,251 (37%) Ships in 12 - 19 working days

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.

The Cybersecurity Self-Help Guide (Hardcover): Arun Soni The Cybersecurity Self-Help Guide (Hardcover)
Arun Soni
R3,428 Discovery Miles 34 280 Ships in 12 - 19 working days

Cybercrime is increasing at an exponential rate. Every day, new hacking techniques and tools are being developed by threat actors to bypass security systems and access private data. Most people do not know how to secure themselves, their devices, and their media shared online. Especially now, cybercriminals appear to be ahead of cybersecurity experts across cyberspace. During the coronavirus pandemic, we witnessed the peak of cybercrime, which is likely to be sustained even after the pandemic. This book is an up-to-date self-help guide for everyone who connects to the Internet and uses technology. It is designed to spread awareness about cybersecurity by explaining techniques and methods that should be implemented practically by readers. Arun Soni is an international award-winning author who has written 159 books on information technology. He is also a Certified Ethical Hacker (CEH v8) from the EC-Council US. His achievements have been covered by major newspapers and portals, such as Business Standard, The Economic Times, Indian Express, The Tribune, Times of India, Yahoo News, and Rediff.com. He is the recipient of multiple international records for this incomparable feat. His vast international exposure in cybersecurity and writing make this book special. This book will be a tremendous help to everybody and will be considered a bible on cybersecurity.

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover)
Ann M. Butera
R1,992 Discovery Miles 19 920 Ships in 12 - 19 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

Cybersecurity for Information Professionals - Concepts and Applications (Paperback): Hsia-Ching Chang, Suliman Hawamdeh Cybersecurity for Information Professionals - Concepts and Applications (Paperback)
Hsia-Ching Chang, Suliman Hawamdeh
R1,442 Discovery Miles 14 420 Ships in 12 - 19 working days

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,166 Discovery Miles 21 660 Ships in 12 - 19 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

An Integrated Approach to Home Security and Safety Systems (Hardcover): Sonali Goyal, Neera Batra, N. K. Batra An Integrated Approach to Home Security and Safety Systems (Hardcover)
Sonali Goyal, Neera Batra, N. K. Batra
R3,564 Discovery Miles 35 640 Ships in 12 - 19 working days

This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB (R) image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6's camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person's heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,756 Discovery Miles 17 560 Ships in 12 - 19 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Assessing and Insuring Cybersecurity Risk (Hardcover): Ravi Das Assessing and Insuring Cybersecurity Risk (Hardcover)
Ravi Das
R4,620 Discovery Miles 46 200 Ships in 12 - 19 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Artificial Intelligence in a Throughput Model - Some Major Algorithms (Paperback): Waymond Rodgers Artificial Intelligence in a Throughput Model - Some Major Algorithms (Paperback)
Waymond Rodgers
R2,274 Discovery Miles 22 740 Ships in 12 - 19 working days

Physical and behavioral biometric technologies such as fingerprinting, facial recognition, voice identification, etc. have enhanced the level of security substantially in recent years. Governments and corporates have employed these technologies to achieve better customer satisfaction. However, biometrics faces major challenges in reducing criminal, terrorist activities and electronic frauds, especially in choosing appropriate decision-making algorithms. To face this challenge, new developments have been made, that amalgamate biometrics with artificial intelligence (AI) in decision-making modeling. Advanced software algorithms of AI, processing information offered by biometric technology, achieve better results. This has led to growth in the biometrics technology industry, and is set to increase the security and internal control operations manifold. This book provides an overview of the existing biometric technologies, decision-making algorithms and the growth opportunity in biometrics. The book proposes a throughput model, which draws on computer science, economics and psychology to model perceptual, informational sources, judgmental processes and decision choice algorithms. It reviews how biometrics might be applied to reduce risks to individuals and organizations, especially when dealing with digital-based media.

Social Engineering Penetration Testing - Executing Social Engineering Pen Tests, Assessments and Defense (Paperback): Gavin... Social Engineering Penetration Testing - Executing Social Engineering Pen Tests, Assessments and Defense (Paperback)
Gavin Watson, Andrew Mason, Richard Ackroyd
R1,106 Discovery Miles 11 060 Ships in 12 - 19 working days

Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, "Social Engineering Penetration Testing" gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks.

The authors of "Social Engineering Penetration Testing "show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
Understand how to plan and execute an effective social engineering assessment Learn how to configure and use the open-source tools available for the social engineer Identify parts of an assessment that will most benefit time-critical engagements Learn how to design target scenarios, create plausible attack situations, and support various attack vectors with technology Create an assessment report, then improve defense measures in response to test results"

Intelligent and Connected Vehicle Security (Hardcover): Jiajia Liu, Abderrahim Benslimane Intelligent and Connected Vehicle Security (Hardcover)
Jiajia Liu, Abderrahim Benslimane
R3,023 Discovery Miles 30 230 Ships in 12 - 19 working days

Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasingly being applied in ICVs, making them more intelligent and connected with devices surrounding the vehicles. However, although the versatile connection and information exchange among ICVs, external devices and human beings provides vehicles with a better and faster perception of surrounding environments and a better driving experience for users, they also create a series of intrusion portals for malicious attackers which threaten the safety of drivers and passengers. This book is concerned with the recognition and protection against such threats. Security for ICVs includes information across the fields of automobile engineering, artificial intelligence, computer, microelectronics, automatic control, communication technology, big data, edge/cloud computing and others. This book comprehensively and systematically introduces security threats to ICVs coming from automotive technology development, on-board sensors, vehicle networking, automobile communications, intelligent transportation, big data, cloud computing, etc. Then, through discussion of some typical automobile cyber-attack cases studies, readers will gain a deeper understanding of the working principle of ICVs, so that they can test vehicles more objectively and scientifically. In this way they will find the existence of vulnerabilities and security risks and take the corresponding protective measures to prevent malicious attacks. Technical topics discussed in the book include but are not limited to: Electronic Control Unit and Vehicular Bus Security; Intra-vehicle Communication Security; V2X Communication Security; VANET Security; Unmanned Driving Security and Navigation Deception

Network Forensics - Privacy and Security (Hardcover): Anchit Bijalwan Network Forensics - Privacy and Security (Hardcover)
Anchit Bijalwan
R3,889 Discovery Miles 38 890 Ships in 12 - 19 working days

This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know - how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security, all kind of network attacks, intention of an attacker, identification of attack, detection, its analysis, incident response, ethical issues, botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security, tools, Digital forensics. Differentiation among network security, computer forensics, network forensics and botnet forensics. Discussion on various cybercrimes, attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication, Computer Science and Computer Engineering.

Cloud Security - Attacks, Techniques, Tools, and Challenges (Hardcover): Preeti Mishra, Emmanuel S. Pilli, R.C. Joshi Cloud Security - Attacks, Techniques, Tools, and Challenges (Hardcover)
Preeti Mishra, Emmanuel S. Pilli, R.C. Joshi
R3,881 Discovery Miles 38 810 Ships in 12 - 19 working days

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis - case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI - case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.

Handbook of Big Data and IoT Security (Hardcover, 1st ed. 2019): Ali Dehghantanha, Kim-Kwang Raymond Choo Handbook of Big Data and IoT Security (Hardcover, 1st ed. 2019)
Ali Dehghantanha, Kim-Kwang Raymond Choo
R5,146 Discovery Miles 51 460 Ships in 10 - 15 working days

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.

Securing India in the Cyber Era (Hardcover): Sameer Patil Securing India in the Cyber Era (Hardcover)
Sameer Patil
R1,718 Discovery Miles 17 180 Ships in 12 - 19 working days

This book explores the geopolitics of the global cyber space to analyse India's cyber security landscape. As conflicts go more online, nation-states are manipulating the cyber space to exploit each other's dependence on information, communication and digital technologies. All the major powers have dedicated cyber units to breach computer networks, harvest sensitive data and proprietary information, and disrupt critical national infrastructure operations. This volume reviews threats to Indian computer networks, analyses the country's policy responses to these threats, and suggests comprehensive measures to build resilience in the system. India constitutes the second largest internet user base in the world, and this expansion of the user base also saw an accompanying rise in cyber crimes. The book discusses how the country can protect this user base, the data-dependent critical infrastructure, build resilient digital payment systems, and answer the challenges of the dark net. It also explores India's cyber diplomacy, as an emerging economy with a large IT industry and a well-established technological base. Topical and lucid, this book as part of The Gateway House Guide to India in the 2020s series, will be of interest to scholars and researchers of cyber security, digital diplomacy, foreign policy, international relations, geopolitics, strategic affairs, defence studies, South Asian politics and international politics.

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R4,178 Discovery Miles 41 780 Ships in 12 - 19 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,633 Discovery Miles 16 330 Ships in 12 - 19 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Cloud Storage Forensics (Paperback): Darren Quick, Ben Martini, Raymond Choo Cloud Storage Forensics (Paperback)
Darren Quick, Ben Martini, Raymond Choo
R1,448 Discovery Miles 14 480 Ships in 12 - 19 working days

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing.

"Cloud Storage Forensics" presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.
Learn to use the methodology and tools from the first evidenced-based cloud forensic framework Case studies provide detailed tools for analysis of cloud storage devices using popular cloud storage services Includes coverage of the legal implications of cloud storage forensic investigations Discussion of the future evolution of cloud storage and its impact on digital forensics

Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback): Josh More,... Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback)
Josh More, Anthony Stieber, Chris Liu
R907 Discovery Miles 9 070 Ships in 12 - 19 working days

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Time Machine Next Door Inventors and…
Iszi Lawrence Paperback R240 R214 Discovery Miles 2 140
A Unified Theory of Polarity Sensitivity…
Ahmad Alqassas Hardcover R3,247 Discovery Miles 32 470
Fairy Tales Every Child Should Know - a…
Hamilton Wright 1846-1916 Edt Mabie, Jacob 1785-1863 Aut Grimm, … Hardcover R977 Discovery Miles 9 770
RLE: Japan Mini-Set D: Politics (POD) (8…
Various Hardcover R24,480 Discovery Miles 244 800
Integral Expansions Related to…
B.N. Mandal, Nanigopal Mandal Hardcover R4,003 Discovery Miles 40 030
Flight For Control
Karlene K Petitt Hardcover R789 Discovery Miles 7 890
The Doctrine of Everlasting Punishment…
Josiah Litch Paperback R403 Discovery Miles 4 030
Biohydrometallurgy of Chalcopyrite
Hongbo Zhao, Congren Yang, … Paperback R3,700 Discovery Miles 37 000
Wish Upon a Crawdad
Curtis W Condon Hardcover R602 Discovery Miles 6 020
Language Planning and National Identity…
K Langston, A. Peti-Stantic Hardcover R3,600 Discovery Miles 36 000

 

Partners