0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (590)
  • R500+ (5,147)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Forensic Document Examination in the 21st Century (Hardcover): Miriam Angel, Jan Seaman Kelly Forensic Document Examination in the 21st Century (Hardcover)
Miriam Angel, Jan Seaman Kelly
R3,530 Discovery Miles 35 300 Ships in 10 - 15 working days

Forensic Document Examination in the 21st Century covers the latest technology and techniques providing a complete resource on contemporary issues and methods in forensic document examination. Forensic document examiners provide their findings as expert testimony in court. Due to rapid changes in technology, including digital documents, printing and photocopying capabilities, and more, there is a great need for this up-to-date reference. The examination of documents can include comparison of handwriting or hand-printing; detection of alterations or photocopier and computer manipulation; restoration or decipherment of erased and obliterated writing; visualization of latent impressions; the identification of printing processes; and differentiation of inks. Computer-generated documents are prevalent, and electronically-captured signatures are becoming more widespread, meaning the knowledge of advances in technology and adoption of new validated techniques and methods of document examination are crucial to the reliability of forensic opinions. Forensic Document Examination in the 21st Century includes the latest research on the subject and with contributions from leading experts on their various areas of expertise. The book will be a welcome addition to the literature and support the foundational basis for methods and procedures for use it expert testimony in court, serving as a resource for forensic document examiners, trainees, and those in the criminal and legal communities who use the services of expert document examiners and witnesses

31 Days Before Your CCNP and CCIE Enterprise Core Exam (Paperback): Patrick Gargano 31 Days Before Your CCNP and CCIE Enterprise Core Exam (Paperback)
Patrick Gargano
R1,177 R1,005 Discovery Miles 10 050 Save R172 (15%) Ships in 18 - 22 working days

31 Days Before Your CCNP and CCIE Enterprise Core Exam is the friendliest, most practical way to understand the CCNP and CCIE Enterprise certification process, commit to taking your ENCOR 350-401 exam, and finish your preparation using a variety of primary and supplemental study resources. Thoroughly updated for the current exam, this comprehensive guide offers a complete day-by-day plan for what and how to study. It covers ENCOR 350-401 enterprise network technology implementation topics including dual stack (IPv4/IPv6) architecture, virtualization, infrastructure, network assurance, security, and automation. Each day breaks down an exam topic into a short, easy-toreview summary, with Daily Study Resource quick-references pointing to deeper treatments elsewhere. Sign up for your exam now, and use this day-by-day guide and checklist to organize, prepare, review, and succeed! How this book helps you fit exam prep into your busy schedule: Visual tear-card calendar summarizes each day's study topic, to help you get through everything Checklist offers expert advice on preparation activities leading up to your exam Descriptions of exam organization and sign-up processes help make sure nothing falls between the cracks Proven strategies help you prepare mentally, organizationally, and physically Conversational tone makes studying more enjoyable Primary Resources: CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide ISBN: 978-1-5871-4523-0 CCNP and CCIE Enterprise Core ENCOR 350-401 Complete Video Course ISBN: 978-0-13-658412-4 CCNP Enterprise Advanced Routing ENARSI 300-410 Official Cert Guide ISBN: 978-1-5871-4525-4 CCNP Enterprise Advanced Routing ENARSI 300-410 Complete Video Course ISBN: 978-0-13-658289-2 CCNP Enterprise: Core Networking (ENCOR) Lab Manual v8 ISBN: 978-0-13-690643-8 CCNP Enterprise: Advanced Routing (ENARSI) Lab Manual v8 ISBN: 978-0-13-687093-7 Supplemental Resources: CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide ISBN: 978-0-13-576816-7

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018):... Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation (Hardcover, 1st ed. 2018)
Sergei Petrenko
R3,809 Discovery Miles 38 090 Ships in 18 - 22 working days

This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system. Most books on cybersecurity focus solely on the technical aspects. But Big Data Technologies for Monitoring of Computer Security demonstrates that military and political considerations should be included as well. With a broad market including architects and research engineers in the field of information security, as well as managers of corporate and state structures, including Chief Information Officers of domestic automation services (CIO) and chief information security officers (CISO), this book can also be used as a case study in university courses.

Cyber Deception - Techniques, Strategies, and Human Aspects (Hardcover, 1st ed. 2023): Tiffany Bao, Milind Tambe, Cliff Wang Cyber Deception - Techniques, Strategies, and Human Aspects (Hardcover, 1st ed. 2023)
Tiffany Bao, Milind Tambe, Cliff Wang
R4,004 Discovery Miles 40 040 Ships in 18 - 22 working days

This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, artificial intelligence, cognitive science, and deception-related technology. Specifically, this book addresses three core elements regarding cyber deception: Understanding human's cognitive behaviors in decoyed network scenarios Developing effective deceptive strategies based on human's behaviors Designing deceptive techniques that supports the enforcement of deceptive strategies The research introduced in this book identifies the scientific challenges, highlights the complexity and inspires the future research of cyber deception. Researchers working in cybersecurity and advanced-level computer science students focused on cybersecurity will find this book useful as a reference. This book also targets professionals working in cybersecurity. Chapter 'Using Amnesia to Detect Credential Database Breaches' and Chapter 'Deceiving ML-Based Friend-or-Foe Identification for Executables' are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles (Hardcover, 1st ed.... Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles (Hardcover, 1st ed. 2017)
Olga Mironenko Enerstvedt
R5,526 Discovery Miles 55 260 Ships in 10 - 15 working days

This book sheds light on aviation security, considering both technologies and legal principles. It considers the protection of individuals in particular their rights to privacy and data protection and raises aspects of international law, human rights and data security, among other relevant topics. Technologies and practices which arise in this volume include body scanners, camera surveillance, biometrics, profiling, behaviour analysis, and the transfer of air passenger personal data from airlines to state authorities. Readers are invited to explore questions such as: What right to privacy and data protection do air passengers have? How can air passenger rights be safeguarded, whilst also dealing appropriately with security threats at airports and in airplanes? Chapters explore these dilemmas and examine approaches to aviation security which may be transferred to other areas of transport or management of public spaces, thus making the issues dealt with here of paramou nt importance to privacy and human rights more broadly. The work presented here reveals current processes and tendencies in aviation security, such as globalization, harmonization of regulation, modernization of existing data privacy regulation, mechanisms of self-regulation, the growing use of Privacy by Design, and improving passenger experience. This book makes an important contribution to the debate on what can be considered proportionate security, taking into account concerns of privacy and related human rights including the right to health, freedom of movement, equal treatment and non-discrimination, freedom of thought, conscience and religion, and the rights of the child. It will be of interest to graduates and researchers in areas of human rights, international law, data security and related areas of law or information science and technology. I think it will also be of interest to other categories (please see e.g. what the reviewers have written) "I think that the book would be of great appeal for airports managing bodies, regulators, Civil Aviation Authorities, Data Protection Authorities, air carriers, any kind of security companies, European Commission Transport Directorate, European Air Safety Agency (EASA), security equipment producers, security agencies like the US TSA, university researchers and teachers." "Lawyers (aviation, privacy and IT lawyers), security experts, aviation experts (security managers of airports, managers and officers from ANSPs and National Aviation Authorities), decision makers, policy makers (EASA, EUROCONTROL, EU commission)"

Continued Rise of the Cloud - Advances and Trends in Cloud Computing (Hardcover, 2014 ed.): Zaigham Mahmood Continued Rise of the Cloud - Advances and Trends in Cloud Computing (Hardcover, 2014 ed.)
Zaigham Mahmood
R4,350 R2,092 Discovery Miles 20 920 Save R2,258 (52%) Ships in 10 - 15 working days

This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of expert researchers and practitioners. Features: presents a focus on security and access control mechanisms for cloud environments, analyses standards and brokerage services, and investigates the role of certification for cloud adoption; evaluates cloud ERP, suggests a framework for implementing "big data" science, and proposes an approach for cloud interoperability; reviews existing elasticity management solutions, discusses the relationship between cloud management and governance, and describes the development of a cloud service capability assessment model; examines cloud applications in higher education, including the use of knowledge-as-a-service in the provision of education, and cloud-based e-learning for students with disabilities.

Cyber Security Challenges Confronting Canada and the United States (Hardcover, New edition): Benjamin T. Johnson, John Michael... Cyber Security Challenges Confronting Canada and the United States (Hardcover, New edition)
Benjamin T. Johnson, John Michael Weaver
R2,096 Discovery Miles 20 960 Ships in 10 - 15 working days

This study turned the tables on a conventional understanding of the four instruments of national power (diplomacy, information, military and economic measures/D.I.M.E.) to see how potential adversaries could use these against the national security interests of Canada and the United States. Moreover, this particular work focuses on qualitative research regarding cyber threats that have continually beleaguered these nations by malevolent actors mostly over the last five years. This study also affords consideration to how nefarious individuals, non-state actors, or nation states can implement the instruments of national power through the application of a new model named the York Intelligence Red Team Model-Cyber (YIRTM-C) using sources guided by the Federal Qualitative Secondary Data Case Study Triangulation Model to arrive at results.

Netcat Power Tools (Paperback): Jan Kanclirz Netcat Power Tools (Paperback)
Jan Kanclirz
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.
* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.
* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.
* Conduct Enumeration and Scanning with Netcat, Nmap, and More Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.
* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.
* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.
* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.
* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.
* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
* Comprehensive introduction to the #4 most popular open source security tool
available
* Tips and tricks on the legitimate uses of Netcat
* Detailed information on its nefarious purposes
* Demystifies security issues surrounding Netcat
* Case studies featuring dozens of ways to use Netcat in daily tasks

Securing Windows Server 2008 - Prevent Attacks from Outside and Inside Your Organization (Paperback): Aaron Tiensivu Securing Windows Server 2008 - Prevent Attacks from Outside and Inside Your Organization (Paperback)
Aaron Tiensivu
R1,279 R894 Discovery Miles 8 940 Save R385 (30%) Ships in 10 - 15 working days

Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever." However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.
As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
1.Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.
2.Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.
3.Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.
4.Protection against malicious software with User Account Control with a new authentication architecture.
5.Increased control over your user settings with Expanded Group Policy.
...to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.

* Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system.
* Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.
* Describes Windows Server 2008's security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
* Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008
* Covers Microsoft's Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product

Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021): Reza Montasari, Hamid Jahankhani,... Digital Forensic Investigation of Internet of Things (IoT) Devices (Hardcover, 1st ed. 2021)
Reza Montasari, Hamid Jahankhani, Richard Hill, Simon Parkinson
R3,995 Discovery Miles 39 950 Ships in 10 - 15 working days

This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.

Cyberdanger - Understanding and Guarding Against Cybercrime (Hardcover, 1st ed. 2019): Eddy Willems Cyberdanger - Understanding and Guarding Against Cybercrime (Hardcover, 1st ed. 2019)
Eddy Willems
R742 Discovery Miles 7 420 Ships in 18 - 22 working days

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It's also a valuable introduction for the general reader who wants to learn about cybersecurity.

Applied Cloud Deep Semantic Recognition - Advanced Anomaly Detection (Paperback): Mehdi Roopaei, Peyman Najafirad (Paul Rad) Applied Cloud Deep Semantic Recognition - Advanced Anomaly Detection (Paperback)
Mehdi Roopaei, Peyman Najafirad (Paul Rad)
R1,462 Discovery Miles 14 620 Ships in 10 - 15 working days

This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. In each chapter, it identifies advanced anomaly detection and key assumptions, which are used by the model to differentiate between normal and anomalous behavior. When applying a given model to a particular application, the assumptions can be used as guidelines to assess the effectiveness of the model in that domain. Each chapter provides an advanced deep content understanding and anomaly detection algorithm, and then shows how the proposed approach is deviating of the basic techniques. Further, for each chapter, it describes the advantages and disadvantages of the algorithm. The final chapters provide a discussion on the computational complexity of the models and graph computational frameworks such as Google Tensorflow and H2O because it is an important issue in real application domains. This book provides a better understanding of the different directions in which research has been done on deep semantic analysis and situational assessment using deep learning for anomalous detection, and how methods developed in one area can be applied in applications in other domains. This book seeks to provide both cyber analytics practitioners and researchers an up-to-date and advanced knowledge in cloud based frameworks for deep semantic analysis and advanced anomaly detection using cognitive and artificial intelligence (AI) models.

Honeypots and Routers - Collecting Internet Attacks (Paperback): Mohssen Mohammed, Habib ur Rehman Honeypots and Routers - Collecting Internet Attacks (Paperback)
Mohssen Mohammed, Habib ur Rehman
R1,462 Discovery Miles 14 620 Ships in 10 - 15 working days

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

Reinforcement Learning for Cyber-Physical Systems - with Cybersecurity Case Studies (Paperback): Chong Li, Meikang Qiu Reinforcement Learning for Cyber-Physical Systems - with Cybersecurity Case Studies (Paperback)
Chong Li, Meikang Qiu
R1,468 Discovery Miles 14 680 Ships in 10 - 15 working days

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.

Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback): Christina Braz, Ahmed... Integrating a Usable Security Protocol into User Authentication Services Design Process (Paperback)
Christina Braz, Ahmed Seffah, Bilal Naqvi
R1,491 Discovery Miles 14 910 Ships in 10 - 15 working days

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.

Configuring Internal Controls for Software as a Service - Between Fragility and Forgiveness (Paperback): Chong Ee Configuring Internal Controls for Software as a Service - Between Fragility and Forgiveness (Paperback)
Chong Ee
R1,484 Discovery Miles 14 840 Ships in 10 - 15 working days

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective internal controls. By addressing the practitioner in the field, it provides tangible, cost effective and thus pragmatic means to mitigate key risks whilst leveraging built-in cloud capabilities and overarching principles of effective system design.

The Data Protection Officer - Profession, Rules, and Role (Paperback): Paul Lambert The Data Protection Officer - Profession, Rules, and Role (Paperback)
Paul Lambert
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.

Security in the Private Cloud (Paperback): John R Vacca Security in the Private Cloud (Paperback)
John R Vacca
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Practical Cloud Security - A Cross-Industry View (Paperback): Kevin L. Jackson, Melvin B. Greer Jr. Practical Cloud Security - A Cross-Industry View (Paperback)
Kevin L. Jackson, Melvin B. Greer Jr.
R1,463 Discovery Miles 14 630 Ships in 10 - 15 working days

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features * Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned * Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies * Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Paperback): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Paperback)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R1,568 Discovery Miles 15 680 Ships in 10 - 15 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

Security without Obscurity - A Guide to Cryptographic Architectures (Paperback): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Paperback)
Jeff Stapleton
R1,458 Discovery Miles 14 580 Ships in 10 - 15 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Analyzing and Securing Social Networks (Paperback): Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu,... Analyzing and Securing Social Networks (Paperback)
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, …
R1,517 Discovery Miles 15 170 Ships in 10 - 15 working days

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.

Building Robots with LEGO Mindstorms NXT (Paperback): Mario Ferrari, Guilio Ferrari Building Robots with LEGO Mindstorms NXT (Paperback)
Mario Ferrari, Guilio Ferrari; Edited by David Astolfo; Foreword by Dan Barry; Contributions by Bryan Bonahoom, …
R844 R678 Discovery Miles 6 780 Save R166 (20%) Ships in 10 - 15 working days

The Ultimate Tool for MINDSTORMS(r) Maniacs
The new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues are now dealt with.
The LEGO MINDSTORMS NXT and its predecessor, the LEGO MINDSTORMS Robotics Invention System (RIS), have been called "the most creative play system ever developed." This book unleashes the full power and potential of the tools, sensors, and components that make up LEGO MINDSTORMS NXT. It also provides a unique insight on newer studless building techniques as well as interfacing with the traditional studded beams. Some of the world's leading LEGO MINDSTORMS inventors share their knowledge and development secrets. You will discover an incredible range of ideas to inspire your next invention. This is the ultimate insider's look at LEGO MINDSTORMS NXT system and is the perfect book whether you build world-class competitive robots or just like to mess around for the fun of it.
Featuring an introduction by astronaut Dan Barry and written by Dave Astolfo, Invited Member of the MINDSTORMS Developer Program and MINDSTORMS Community Partners (MCP) groups, and Mario and Guilio Ferrari, authors of the bestselling Building Robots with LEGO Mindstorms, this book covers:
Understanding LEGO Geometry
Playing with Gears
Controlling Motors
Reading Sensors
What's New with the NXT?
Building Strategies
Programming the NXT
Playing Sounds and Music
Becoming Mobile
Getting Pumped: Pneumatics
Finding and Grabbing Objects
Doing the Math
Knowing Where You Are
Classic Projects
Building Robots That Walk
Robotic Animals
Solving a Maze
Drawing and Writing
Racing Against Time
Hand-to-Hand Combat
Searching for Precision
*Complete coverage of the new Mindstorms NXT kit
*Brought to you by the DaVinci's of LEGO
*Updated edition of a bestseller

Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback): William R. Simpson Enterprise Level Security - Securing Information Systems in an Uncertain World (Paperback)
William R. Simpson
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.

Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover): Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover)
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong
R5,617 Discovery Miles 56 170 Ships in 10 - 15 working days

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Durban & Surrounds - Visitor's Guide
Sue Derwent & friends Sue Derwent & friends Paperback R55 R51 Discovery Miles 510
Dartmoor
Sheet map, folded R402 R374 Discovery Miles 3 740
Cotswolds Pocket Map - The Perfect Way…
Collins Maps Sheet map, folded R104 Discovery Miles 1 040
Organ Registration - A Comprehensive…
Everett E. Truette Paperback R500 Discovery Miles 5 000
Scafell and Great Gable - A Hillwalker's…
Sheet map, folded R170 Discovery Miles 1 700
Suzuki Piano School 1 - New…
Alfred Music Paperback R339 Discovery Miles 3 390
Concert etude for solo piano I. - from…
Hristo Spasov Tsanov Paperback R226 Discovery Miles 2 260
South Pembrokeshire / De Sir Benfro
Ordnance Survey Sheet map, folded  (1)
R361 R325 Discovery Miles 3 250
Philip's Isle of Wight Leisure & Tourist…
Philip's Maps Sheet map R169 Discovery Miles 1 690
Walks Around Ullswater - Haweswater…
Sheet map, folded R196 Discovery Miles 1 960

 

Partners