0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,157)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Insider Computer Fraud - An In-depth Framework for Detecting and Defending against Insider IT Attacks (Paperback): Kenneth... Insider Computer Fraud - An In-depth Framework for Detecting and Defending against Insider IT Attacks (Paperback)
Kenneth Brancik
R1,799 Discovery Miles 17 990 Ships in 10 - 15 working days

An organization's employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud. Drawing from the author's vast experience assessing the adequacy of IT security for the banking and securities industries, the book presents a practical framework for identifying, measuring, monitoring, and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks, it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit, process, and store sensitive data. The author also examines the symbiotic relationship between the risks, controls, threats, and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat, this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process.

Building an Effective Information Security Policy Architecture (Paperback): Sandy Bacik Building an Effective Information Security Policy Architecture (Paperback)
Sandy Bacik
R1,879 Discovery Miles 18 790 Ships in 10 - 15 working days

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise. A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book demonstrates how to evaluate an organization's culture and its ability to meet various security standards and requirements. Because the effectiveness of a policy is dependent on cooperation and compliance, the author also provides tips on how to communicate the policy and gain support for it. Suitable for any level of technical aptitude, this book serves a guide for evaluating the business needs and risks of an enterprise and incorporating this information into an effective security policy architecture.

A Hacker's Mind - How the Powerful Bend Society's Rules, and How to Bend them Back (Hardcover): Bruce Schneier A Hacker's Mind - How the Powerful Bend Society's Rules, and How to Bend them Back (Hardcover)
Bruce Schneier
R697 Discovery Miles 6 970 Ships in 10 - 15 working days

A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies." And there is an entire industry of "black hat" hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys. In A Hacker's Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyse the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political and legal systems to their advantage, at the expense of everyone else. Once you learn how to notice hacks, you'll start seeing them everywhere-and you'll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you. Unchecked, these hacks threaten to upend our financial markets, weaken our democracy and even affect the way we think. And when artificial intelligence starts thinking like a hacker-at inhuman speed and scale-the results could be catastrophic. But for those who would don the "white hat," we can understand the hacking mindset and rebuild our economic, political and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks and realise a more equitable world.

Security within CONASENSE Paragon (Hardcover): Ramjee Prasad, Leo P. Ligthart Security within CONASENSE Paragon (Hardcover)
Ramjee Prasad, Leo P. Ligthart
R2,852 Discovery Miles 28 520 Ships in 10 - 15 working days

Security within CONASENSE Paragon describes in particular the cyber security issues in the field of Communication, Navigation, Sensing and Services within the broad platform of CTIF Global Capsule (CGC). This covers future technologies and its enablers, smart cities, crowd computing, reliable and secure communication interface, satellite unnamed air vehicles, wireless sensor networks, data analytics and deep learning, remotely piloted aircraft system and public safety, network neutrality, business ecosystem innovation and so on.

Penetration Testing - A guide for business and IT managers (Paperback): James Hayes Penetration Testing - A guide for business and IT managers (Paperback)
James Hayes; Nick Furneaux, Jims Marchang, Rob Ellis, Jason Charalambous, …
R1,178 Discovery Miles 11 780 Ships in 18 - 22 working days

Penetration testing is the attempt to professionally break in to an organisation's computer systems, with the goal of determining whether the systems are secure. This guide for business and IT managers, developed in collaboration with CREST, explains the process of penetration testing and the benefits it brings. The book provides essential insight and tips for setting up a penetration testing programme, maintaining it, and responding to the results of penetration tests.

Acquiring Card Payments (Hardcover): Ilya Dubinsky Acquiring Card Payments (Hardcover)
Ilya Dubinsky
R3,066 Discovery Miles 30 660 Ships in 10 - 15 working days

This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction. A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology

IT Convergence and Security - Proceedings of ICITCS 2021 (Hardcover, 1st ed. 2021): Hyuncheol Kim, Kuinam J. Kim IT Convergence and Security - Proceedings of ICITCS 2021 (Hardcover, 1st ed. 2021)
Hyuncheol Kim, Kuinam J. Kim
R8,770 Discovery Miles 87 700 Ships in 18 - 22 working days

This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.

Fundamentals of Smart Contract Security (Paperback): Richard Ma, Jan Gorzny, Edward Zulkoski Fundamentals of Smart Contract Security (Paperback)
Richard Ma, Jan Gorzny, Edward Zulkoski
R1,048 R876 Discovery Miles 8 760 Save R172 (16%) Ships in 18 - 22 working days
Unimodal and Multimodal Biometric Data Indexing (Hardcover): Somnath Dey, Debasis, Samanta Unimodal and Multimodal Biometric Data Indexing (Hardcover)
Somnath Dey, Debasis, Samanta
R2,772 Discovery Miles 27 720 Ships in 10 - 15 working days

This work is on biometric data indexing for large-scale identification systems with a focus on different biometrics data indexing methods. It provides state-of-the-art coverage including different biometric traits, together with the pros and cons for each. Discussion of different multimodal fusion strategies are also included.

Software Deployment, Updating, and Patching (Paperback): Bill Stackpole, Patrick Hanrion Software Deployment, Updating, and Patching (Paperback)
Bill Stackpole, Patrick Hanrion
R1,803 Discovery Miles 18 030 Ships in 10 - 15 working days

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing systems with the latest packs and patches. Written by two of Microsoft's top experts, this clear and concise manual demonstrates how to perform inventories of IT assets, test compatibility, target deployment, and evaluate management technologies. It also shows you how to create and implement your own deployment plans with recovery and remediation options, and how to recognize potential vulnerabilities.

Privacy, Data Protection and Cybersecurity in Europe (Hardcover, 1st ed. 2017): Wolf J. Schunemann, Max-Otto Baumann Privacy, Data Protection and Cybersecurity in Europe (Hardcover, 1st ed. 2017)
Wolf J. Schunemann, Max-Otto Baumann
R2,408 Discovery Miles 24 080 Ships in 10 - 15 working days

This book offers a comparative perspective on data protection and cybersecurity in Europe. In light of the digital revolution and the implementation of social media applications and big data innovations, it analyzes threat perceptions regarding privacy and cyber security, and examines socio-political differences in the fundamental conceptions and narratives of privacy, and in data protection regimes, across various European countries. The first part of the book raises fundamental legal and ethical questions concerning data protection; the second analyses discourses on cybersecurity and data protection in various European countries; and the third part discusses EU regulations and norms intended to create harmonized data protection regimes.

Practical LTE Based Security Forces PMR Networks (Hardcover): Arnaud Henry-Labordere Practical LTE Based Security Forces PMR Networks (Hardcover)
Arnaud Henry-Labordere
R2,729 Discovery Miles 27 290 Ships in 10 - 15 working days

Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR.

Concurrency Control And Recovery In Oltp Systems: High Scalability And Availability (Hardcover): Peng Cai, Jinwei Guo, Aoying... Concurrency Control And Recovery In Oltp Systems: High Scalability And Availability (Hardcover)
Peng Cai, Jinwei Guo, Aoying Zhou
R2,356 Discovery Miles 23 560 Ships in 18 - 22 working days

Transaction processing is fundamental for many modern applications. These applications require the backend transaction processing engines to be available at all times as well as provide a massive horizontal scale for intensive transaction requests.Concurrency Control and Recovery features recent progress in research in online transaction processing. The book also showcases the authors' research on a highly scalable OLTP system. Its contents include the designs of an efficient multiple version storage engine, a scalable range optimistic concurrency control, high-performance Paxos-based log replication, global snapshot isolation, and fast follower recovery.This book is written for professionals, researchers, and graduate students specialising in database systems and its related fields.

Managing Trust in Cyberspace (Paperback): Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Managing Trust in Cyberspace (Paperback)
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
R1,813 Discovery Miles 18 130 Ships in 10 - 15 working days

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.

Intelligent Information Processing IX - 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22,... Intelligent Information Processing IX - 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings (Hardcover, 1st ed. 2018)
Zhongzhi Shi, Eunika Mercier-Laurent, Jiuyong Li
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2018, held in Nanning, China, in October 2018. The 37 full papers and 8 short papers presented were carefully reviewed and selected from 80 submissions. They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.

Cyber Warfare - Building the Scientific Foundation (Hardcover, 2015 ed.): Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian,... Cyber Warfare - Building the Scientific Foundation (Hardcover, 2015 ed.)
Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R4,086 Discovery Miles 40 860 Ships in 10 - 15 working days

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.

Algebraic Aspects of the Advanced Encryption Standard (Hardcover, 2006 ed.): Carlos Cid, Sean Murphy, Matthew Robshaw Algebraic Aspects of the Advanced Encryption Standard (Hardcover, 2006 ed.)
Carlos Cid, Sean Murphy, Matthew Robshaw
R2,962 Discovery Miles 29 620 Ships in 18 - 22 working days

It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech- niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work will be of interest to both cryptogra- phers and algebraists and will stimulate future research. During the writing of this monograph we have found reasons to thank many people. We are especially grateful to the British Engineering and Physical Sciences Research Council (EPSRC) for their funding of the research project Security Analysis of the Advanced Encryption System (Grant GR/S42637), and to Susan Lagerstrom-Fifc and Sharon Palleschi at Springer. Wo would also hke to thank Glaus Diem, Maura Paterson, and Ludovic Perret for their valuable comments. Finally, the support of our families at home and our colleagues at work has been invaluable and particularly appreciated.

Convergence of Internet of Things and Blockchain Technologies (Hardcover, 1st ed. 2022): H L Gururaj, V. Ravi Kumar, Sam... Convergence of Internet of Things and Blockchain Technologies (Hardcover, 1st ed. 2022)
H L Gururaj, V. Ravi Kumar, Sam Goundar, Ahmed A. Elngar, B H Swathi
R3,126 Discovery Miles 31 260 Ships in 18 - 22 working days

This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments. The book provides an extensive cross-sectional and multi-disciplinary look into this trend and how it affects artificial intelligence, cyber-physical systems, and robotics with a look at applications in aerospace, agriculture, automotive, critical infrastructures, healthcare, manufacturing, retail, smart transport systems, smart cities, and smart healthcare. Cases include the impact of Blockchain for IoT Security; decentralized access control systems in IoT; Blockchain architecture for scalable access management in IoT; smart and sustainable IoT applications incorporating Blockchain, and more. The book presents contributions from international academics, researchers, and practitioners from diverse perspectives. Presents how Blockchain and IoT are converging and the impacts of these developments on technology and its application; Discusses IoT and Blockchain from cross-sectional and multi-disciplinary perspectives; Includes contributions from researchers, academics, and professionals from around the world.

Practical Risk Management for the CIO (Paperback): Mark  Scherling Practical Risk Management for the CIO (Paperback)
Mark Scherling
R1,743 Discovery Miles 17 430 Ships in 10 - 15 working days

The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invisible until disaster strikes. Detailing procedures to help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through improvements to information management and information security. It provides easy-to-follow guidance on how to effectively manage the flow of information and incorporate both service delivery and reliability. Explains why every CIO should be managing his or her information differently Provides time-tested risk ranking strategies Considers information security strategy standards such as NIST, FISMA, PCI, SP 800, & ISO 17799 Supplies steps for managing: information flow, classification, controlled vocabularies, life cycle, and data leakage Describes how to put it all together into a complete information risk management framework Information is one of your most valuable assets. If you aren't on the constant lookout for better ways to manage it, your organization will inevitably suffer. Clarifying common misunderstandings about the risks in cyberspace, this book provides the foundation required to make more informed decisions and effectively manage, protect, and deliver information to your organization and its constituents.

Redesigning Wiretapping - The Digitization of Communications Interception (Hardcover, 1st ed. 2020): Joseph Fitsanakis Redesigning Wiretapping - The Digitization of Communications Interception (Hardcover, 1st ed. 2020)
Joseph Fitsanakis
R3,986 Discovery Miles 39 860 Ships in 10 - 15 working days

This book tells the story of government-sponsored wiretapping in Britain and the United States from the rise of telephony in the 1870s until the terrorist attacks of 9/11. It pays particular attention to the 1990s, which marked one of the most dramatic turns in the history of telecommunications interception. During that time, fiber optic and satellite networks rapidly replaced the copper-based analogue telephone system that had remained virtually unchanged since the 1870s. That remarkable technological advance facilitated the rise of the networked home computer, cellular telephony, and the Internet, and users hailed the dawn of the digital information age. However, security agencies such as the FBI and MI5 were concerned. Since the emergence of telegraphy in the 1830s, security services could intercept private messages using wiretaps, and this was facilitated by some of the world's largest telecommunications monopolies such as AT&T in the US and British Telecom in the UK. The new, digital networks were incompatible with traditional wiretap technology. To make things more complicated for the security services, these monopolies had been privatized and broken up into smaller companies during the 1980s, and in the new deregulated landscape the agencies had to seek assistance from thousands of startup companies that were often unwilling to help. So for the first time in history, technological and institutional changes posed a threat to the security services' wiretapping activities, and government officials in Washington and London acted quickly to protect their ability to spy, they sought to force the industry to change the very architecture of the digital telecommunications network. This book describes in detail the tense negotiations between governments, the telecommunications industry, and civil liberties groups during an unprecedented moment in history when the above security agencies were unable to wiretap. It reveals for the first time the thoughts of some of the protagonists in these crucial negotiations, and explains why their outcome may have forever altered the trajectory of our information society.

Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and... Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (Hardcover, 1st ed. 2021)
Kevin Daimi, Hamid R Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti
R7,145 Discovery Miles 71 450 Ships in 18 - 22 working days

The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems; Features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.

Valuing Data - An Open Framework (Hardcover): Dewey Ray Valuing Data - An Open Framework (Hardcover)
Dewey Ray
R2,428 Discovery Miles 24 280 Ships in 10 - 15 working days

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.

Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover): Kai Rannenberg, Jan Camenisch, Ahmad... Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover)
Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
R3,518 Discovery Miles 35 180 Ships in 10 - 15 working days

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)

Cyber Security Innovation for the Digital Economy - A Case Study of the Russian Federation (Hardcover): Sergei Petrenko Cyber Security Innovation for the Digital Economy - A Case Study of the Russian Federation (Hardcover)
Sergei Petrenko
R2,566 Discovery Miles 25 660 Ships in 10 - 15 working days

Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and "computational cognitivism," involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: - Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy - Determination of the limiting capabilities - Possible scientific and technical solutions - Organization of perspective research studies in the area of Digital Economy cyber security in Russia

Security and Privacy in Smart Grids (Paperback): Yang Xiao Security and Privacy in Smart Grids (Paperback)
Yang Xiao
R1,737 Discovery Miles 17 370 Ships in 10 - 15 working days

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today's smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book's chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Percy Jackson and the Olympians - Wrath…
Rick Riordan Paperback R250 R223 Discovery Miles 2 230
Kattemaai 1: Die Bure Se Nuwe Dogter
Betsie Vos Paperback R160 R150 Discovery Miles 1 500
The Rose Society (The Young Elites book…
Marie Lu Paperback  (1)
R292 R267 Discovery Miles 2 670
Snail Mail - With Pull-Out Postcards
Sharon King-Chai Hardcover  (1)
R391 R331 Discovery Miles 3 310
Roar - A Big-mouthed Book of Noises
Fhiona Galloway Novelty book R208 Discovery Miles 2 080
Colour Bus
Roger Priddy Board book  (1)
R150 R136 Discovery Miles 1 360
Marvel Spidey and his Amazing Friends My…
Phidal Publishing Board book R360 R326 Discovery Miles 3 260
1984 Nineteen Eighty-Four
George Orwell Paperback R124 R115 Discovery Miles 1 150
Let's Pretend: On The Farm
Roger Priddy Board book R481 R451 Discovery Miles 4 510
Betty Zane
Zane Grey Hardcover R805 Discovery Miles 8 050

 

Partners