0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (589)
  • R500+ (5,151)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Information Security and Optimization (Hardcover): Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta Information Security and Optimization (Hardcover)
Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
R3,509 Discovery Miles 35 090 Ships in 10 - 15 working days

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

Cybersecurity And Legal-regulatory Aspects (Hardcover): Gabi Siboni, Limor Ezioni Cybersecurity And Legal-regulatory Aspects (Hardcover)
Gabi Siboni, Limor Ezioni
R3,067 Discovery Miles 30 670 Ships in 18 - 22 working days

Cyberspace has become a critical part of our lives and as a result is an important academic research topic. It is a multifaceted and dynamic domain that is largely driven by the business-civilian sector, with influential impacts on national security. This book presents current and diverse matters related to regulation and jurisdictive activity within the cybersecurity context. Each section includes a collection of scholarly articles providing an analysis of questions, research directions, and methods within the field.The interdisciplinary book is an authoritative and comprehensive reference to the overall discipline of cybersecurity. The coverage of the book will reflect the most advanced discourse on related issues.

Next Generation Red Teaming (Paperback): Henry Dalziel Next Generation Red Teaming (Paperback)
Henry Dalziel
R1,101 Discovery Miles 11 010 Ships in 18 - 22 working days

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization's security posture is. This course is particularly suited to CISO's and CTO's that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.

Security and Organization within IoT and Smart Cities (Hardcover): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Hardcover)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R2,164 Discovery Miles 21 640 Ships in 10 - 15 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Handbook of Research on Network Forensics and Analysis Techniques (Hardcover): Gulshan Shrivistava, Prabhat Kumar, Bb Gupta,... Handbook of Research on Network Forensics and Analysis Techniques (Hardcover)
Gulshan Shrivistava, Prabhat Kumar, Bb Gupta, Suman Bala, Nilanjan Dey
R8,284 Discovery Miles 82 840 Ships in 18 - 22 working days

With the rapid advancement in technology, myriad new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. The Handbook of Research on Network Forensics and Analysis Techniques is a current research publication that examines the advancements and growth of forensic research from a relatively obscure tradecraft to an important part of many investigations. Featuring coverage on a broad range of topics including cryptocurrency, hand-based biometrics, and cyberterrorism, this publication is geared toward professionals, computer forensics practitioners, engineers, researchers, and academics seeking relevant research on the development of forensic tools.

Enhancing Business Continuity and IT Capability - System Administration and Server Operating Platforms (Hardcover): Nijaz... Enhancing Business Continuity and IT Capability - System Administration and Server Operating Platforms (Hardcover)
Nijaz Bajgoric, Lejla Turulja, Semir Ibrahimovic, Amra Alagic
R2,944 Discovery Miles 29 440 Ships in 10 - 15 working days

Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company's information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm's performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book.

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018):... Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018)
Sergei Petrenko
R3,809 Discovery Miles 38 090 Ships in 18 - 22 working days

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.

Cyber Deception - Techniques, Strategies, and Human Aspects (Hardcover, 1st ed. 2023): Tiffany Bao, Milind Tambe, Cliff Wang Cyber Deception - Techniques, Strategies, and Human Aspects (Hardcover, 1st ed. 2023)
Tiffany Bao, Milind Tambe, Cliff Wang
R4,004 Discovery Miles 40 040 Ships in 18 - 22 working days

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human's cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human's behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles (Hardcover, 1st ed.... Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles (Hardcover, 1st ed. 2017)
Olga Mironenko Enerstvedt
R5,526 Discovery Miles 55 260 Ships in 10 - 15 working days

This book sheds light on aviation security, considering both technologies and legal principles. It considers the protection of individuals in particular their rights to privacy and data protection and raises aspects of international law, human rights and data security, among other relevant topics. Technologies and practices which arise in this volume include body scanners, camera surveillance, biometrics, profiling, behaviour analysis, and the transfer of air passenger personal data from airlines to state authorities. Readers are invited to explore questions such as: What right to privacy and data protection do air passengers have? How can air passenger rights be safeguarded, whilst also dealing appropriately with security threats at airports and in airplanes? Chapters explore these dilemmas and examine approaches to aviation security which may be transferred to other areas of transport or management of public spaces, thus making the issues dealt with here of paramou nt importance to privacy and human rights more broadly. The work presented here reveals current processes and tendencies in aviation security, such as globalization, harmonization of regulation, modernization of existing data privacy regulation, mechanisms of self-regulation, the growing use of Privacy by Design, and improving passenger experience. This book makes an important contribution to the debate on what can be considered proportionate security, taking into account concerns of privacy and related human rights including the right to health, freedom of movement, equal treatment and non-discrimination, freedom of thought, conscience and religion, and the rights of the child. It will be of interest to graduates and researchers in areas of human rights, international law, data security and related areas of law or information science and technology. I think it will also be of interest to other categories (please see e.g. what the reviewers have written) "I think that the book would be of great appeal for airports managing bodies, regulators, Civil Aviation Authorities, Data Protection Authorities, air carriers, any kind of security companies, European Commission Transport Directorate, European Air Safety Agency (EASA), security equipment producers, security agencies like the US TSA, university researchers and teachers." "Lawyers (aviation, privacy and IT lawyers), security experts, aviation experts (security managers of airports, managers and officers from ANSPs and National Aviation Authorities), decision makers, policy makers (EASA, EUROCONTROL, EU commission)"

Continued Rise of the Cloud - Advances and Trends in Cloud Computing (Hardcover, 2014 ed.): Zaigham Mahmood Continued Rise of the Cloud - Advances and Trends in Cloud Computing (Hardcover, 2014 ed.)
Zaigham Mahmood
R4,350 R2,092 Discovery Miles 20 920 Save R2,258 (52%) Ships in 10 - 15 working days

This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of expert researchers and practitioners. Features: presents a focus on security and access control mechanisms for cloud environments, analyses standards and brokerage services, and investigates the role of certification for cloud adoption; evaluates cloud ERP, suggests a framework for implementing "big data" science, and proposes an approach for cloud interoperability; reviews existing elasticity management solutions, discusses the relationship between cloud management and governance, and describes the development of a cloud service capability assessment model; examines cloud applications in higher education, including the use of knowledge-as-a-service in the provision of education, and cloud-based e-learning for students with disabilities.

Cyber Security Challenges Confronting Canada and the United States (Hardcover, New edition): Benjamin T. Johnson, John Michael... Cyber Security Challenges Confronting Canada and the United States (Hardcover, New edition)
Benjamin T. Johnson, John Michael Weaver
R2,096 Discovery Miles 20 960 Ships in 10 - 15 working days

This study turned the tables on a conventional understanding of the four instruments of national power (diplomacy, information, military and economic measures/D.I.M.E.) to see how potential adversaries could use these against the national security interests of Canada and the United States. Moreover, this particular work focuses on qualitative research regarding cyber threats that have continually beleaguered these nations by malevolent actors mostly over the last five years. This study also affords consideration to how nefarious individuals, non-state actors, or nation states can implement the instruments of national power through the application of a new model named the York Intelligence Red Team Model-Cyber (YIRTM-C) using sources guided by the Federal Qualitative Secondary Data Case Study Triangulation Model to arrive at results.

Netcat Power Tools (Paperback): Jan Kanclirz Netcat Power Tools (Paperback)
Jan Kanclirz
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.
* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.
* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.
* Conduct Enumeration and Scanning with Netcat, Nmap, and More Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.
* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.
* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.
* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.
* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.
* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
* Comprehensive introduction to the #4 most popular open source security tool
available
* Tips and tricks on the legitimate uses of Netcat
* Detailed information on its nefarious purposes
* Demystifies security issues surrounding Netcat
* Case studies featuring dozens of ways to use Netcat in daily tasks

Securing Windows Server 2008 - Prevent Attacks from Outside and Inside Your Organization (Paperback): Aaron Tiensivu Securing Windows Server 2008 - Prevent Attacks from Outside and Inside Your Organization (Paperback)
Aaron Tiensivu
R1,279 R894 Discovery Miles 8 940 Save R385 (30%) Ships in 10 - 15 working days

Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever." However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.
As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
1.Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.
2.Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.
3.Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.
4.Protection against malicious software with User Account Control with a new authentication architecture.
5.Increased control over your user settings with Expanded Group Policy.
...to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.

* Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system.
* Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.
* Describes Windows Server 2008's security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
* Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008
* Covers Microsoft's Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product

Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021): Reza Montasari, Hamid Jahankhani,... Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021)
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson
R3,995 Discovery Miles 39 950 Ships in 10 - 15 working days

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.

Cyberdanger - Understanding and Guarding Against Cybercrime (Hardcover, 1st ed. 2019): Eddy Willems Cyberdanger - Understanding and Guarding Against Cybercrime (Hardcover, 1st ed. 2019)
Eddy Willems
R742 Discovery Miles 7 420 Ships in 18 - 22 working days

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It's also a valuable introduction for the general reader who wants to learn about cybersecurity.

Applied Cloud Deep Semantic Recognition - Advanced Anomaly Detection (Paperback): Mehdi Roopaei, Peyman Najafirad (Paul Rad) Applied Cloud Deep Semantic Recognition - Advanced Anomaly Detection (Paperback)
Mehdi Roopaei, Peyman Najafirad (Paul Rad)
R1,462 Discovery Miles 14 620 Ships in 10 - 15 working days

This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. In each chapter, it identifies advanced anomaly detection and key assumptions, which are used by the model to differentiate between normal and anomalous behavior. When applying a given model to a particular application, the assumptions can be used as guidelines to assess the effectiveness of the model in that domain. Each chapter provides an advanced deep content understanding and anomaly detection algorithm, and then shows how the proposed approach is deviating of the basic techniques. Further, for each chapter, it describes the advantages and disadvantages of the algorithm. The final chapters provide a discussion on the computational complexity of the models and graph computational frameworks such as Google Tensorflow and H2O because it is an important issue in real application domains. This book provides a better understanding of the different directions in which research has been done on deep semantic analysis and situational assessment using deep learning for anomalous detection, and how methods developed in one area can be applied in applications in other domains. This book seeks to provide both cyber analytics practitioners and researchers an up-to-date and advanced knowledge in cloud based frameworks for deep semantic analysis and advanced anomaly detection using cognitive and artificial intelligence (AI) models.

Honeypots and Routers - Collecting Internet Attacks (Paperback): Mohssen Mohammed, Habib ur Rehman Honeypots and Routers - Collecting Internet Attacks (Paperback)
Mohssen Mohammed, Habib ur Rehman
R1,462 Discovery Miles 14 620 Ships in 10 - 15 working days

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

Reinforcement Learning for Cyber-Physical Systems - with Cybersecurity Case Studies (Paperback): Chong Li, Meikang Qiu Reinforcement Learning for Cyber-Physical Systems - with Cybersecurity Case Studies (Paperback)
Chong Li, Meikang Qiu
R1,468 Discovery Miles 14 680 Ships in 10 - 15 working days

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Configuring Internal Controls for Software as a Service - Between Fragility and Forgiveness (Paperback): Chong Ee Configuring Internal Controls for Software as a Service - Between Fragility and Forgiveness (Paperback)
Chong Ee
R1,484 Discovery Miles 14 840 Ships in 10 - 15 working days

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective internal controls. By addressing the practitioner in the field, it provides tangible, cost effective and thus pragmatic means to mitigate key risks whilst leveraging built-in cloud capabilities and overarching principles of effective system design.

The Data Protection Officer - Profession, Rules, and Role (Paperback): Paul Lambert The Data Protection Officer - Profession, Rules, and Role (Paperback)
Paul Lambert
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.

Security in the Private Cloud (Paperback): John R Vacca Security in the Private Cloud (Paperback)
John R Vacca
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Practical Cloud Security - A Cross-Industry View (Paperback): Kevin L. Jackson, Melvin B. Greer Jr. Practical Cloud Security - A Cross-Industry View (Paperback)
Kevin L. Jackson, Melvin B. Greer Jr.
R1,463 Discovery Miles 14 630 Ships in 10 - 15 working days

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features * Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned * Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies * Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Paperback): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Paperback)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Security without Obscurity - A Guide to Cryptographic Architectures (Paperback): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Paperback)
Jeff Stapleton
R1,458 Discovery Miles 14 580 Ships in 10 - 15 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Airimagination - Extending the Airline…
Nawal K. Taneja Hardcover R1,680 Discovery Miles 16 800
Psychology and Human Performance in…
Lauren Blackwell Landon, Kelley J. Slack, … Hardcover R9,991 Discovery Miles 99 910
European Aeronautics - The Southwestern…
Javier Alfonso-Gil Hardcover R2,802 Discovery Miles 28 020
Communicate to Influence: How to Inspire…
Ben Decker, Kelly Decker Hardcover R633 R544 Discovery Miles 5 440
Effective Business Communication…
Franzel du Plooy-Cilliers Paperback R484 Discovery Miles 4 840
Learning-Based Local Visual…
Rongrong Ji, Yue Gao, … Paperback R835 Discovery Miles 8 350
The Digital Challenge: Information…
Shirin Madon, S. Krishna Hardcover R4,095 Discovery Miles 40 950
Air Transport Management - An…
Lucy Budd, Stephen Ison Hardcover R4,523 Discovery Miles 45 230
Psychology and Human Performance in…
Lauren Blackwell Landon, Kelley J. Slack, … Hardcover R5,052 Discovery Miles 50 520
Air Cargo Management - Air Freight and…
Michael Sales, Sebastiaan Scholte Paperback R1,526 Discovery Miles 15 260

 

Partners