0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (595)
  • R500+ (5,135)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Security and Privacy in Internet of Things (IoTs) - Models, Algorithms, and Implementations (Paperback): Fei Hu Security and Privacy in Internet of Things (IoTs) - Models, Algorithms, and Implementations (Paperback)
Fei Hu
R1,517 Discovery Miles 15 170 Ships in 10 - 15 working days

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.

Securing Cyber-Physical Systems (Paperback): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Paperback)
Al-Sakib Khan Pathan
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Statistical Methods in Computer Security (Paperback): William W.S. Chen Statistical Methods in Computer Security (Paperback)
William W.S. Chen
R1,571 Discovery Miles 15 710 Ships in 10 - 15 working days

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.

ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24,... ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
R3,858 Discovery Miles 38 580 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Artificial Intelligence in a Throughput Model - Some Major Algorithms (Hardcover): Waymond Rodgers Artificial Intelligence in a Throughput Model - Some Major Algorithms (Hardcover)
Waymond Rodgers
R5,338 Discovery Miles 53 380 Ships in 10 - 15 working days

Physical and behavioral biometric technologies such as fingerprinting, facial recognition, voice identification, etc. have enhanced the level of security substantially in recent years. Governments and corporates have employed these technologies to achieve better customer satisfaction. However, biometrics faces major challenges in reducing criminal, terrorist activities and electronic frauds, especially in choosing appropriate decision-making algorithms. To face this challenge, new developments have been made, that amalgamate biometrics with artificial intelligence (AI) in decision-making modeling. Advanced software algorithms of AI, processing information offered by biometric technology, achieve better results. This has led to growth in the biometrics technology industry, and is set to increase the security and internal control operations manifold. This book provides an overview of the existing biometric technologies, decision-making algorithms and the growth opportunity in biometrics. The book proposes a throughput model, which draws on computer science, economics and psychology to model perceptual, informational sources, judgmental processes and decision choice algorithms. It reviews how biometrics might be applied to reduce risks to individuals and organizations, especially when dealing with digital-based media.

Writing Security Tools and Exploits (Paperback): James Foster Writing Security Tools and Exploits (Paperback)
James Foster
R1,129 Discovery Miles 11 290 Ships in 10 - 15 working days

Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book.
The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
* Provides readers with working code to develop and modify the most common security tools including Nmap and Nessus
* Learn to reverse engineer and write exploits for various operating systems, databases, and applications
* Automate reporting and analysis of security log files

CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Paperback): Todd Fitzgerald CISO COMPASS - Navigating Cybersecurity Leadership Challenges with Insights from Pioneers (Paperback)
Todd Fitzgerald
R1,554 Discovery Miles 15 540 Ships in 10 - 15 working days

#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020 and 2021 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program. CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the tough battle. Todd has also, for the first time, adapted the McKinsey 7S framework (strategy, structure, systems, shared values, staff, skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization, capable of industry/ peer award-winning recognition, enhance cybersecurity maturity, gain confidence by senior management, and avoid pitfalls. The book is a comprehensive, soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy, emerging trends and technologies, cybersecurity organization structure and reporting models, leveraging current incidents, security control frameworks, risk management, laws and regulations, data protection and privacy, meaningful policies and procedures, multi-generational workforce team dynamics, soft skills, and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity.

Trust and Technology in a Ubiquitous Modern Environment - Theoretical and Methodological Perspectives (Hardcover): Trust and Technology in a Ubiquitous Modern Environment - Theoretical and Methodological Perspectives (Hardcover)
R4,595 Discovery Miles 45 950 Ships in 18 - 22 working days

In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-maintenance, and trust-destroying practices in the context of technology. It presents research positioned at the intersection of the issues of trust within and between individuals, and organizations, and technology under various guises, for example, high-tech work environments, computer-mediated communication, and the Internet as a business environment.

Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised... Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Gilbert Peterson, Sujeet Shenoi
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Fundamentals of Computer Security (Hardcover, 2003 ed.): Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry Fundamentals of Computer Security (Hardcover, 2003 ed.)
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
R2,587 Discovery Miles 25 870 Ships in 10 - 15 working days

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

IT Convergence and Security - Proceedings of ICITCS 2021 (Hardcover, 1st ed. 2021): Hyuncheol Kim, Kuinam J. Kim IT Convergence and Security - Proceedings of ICITCS 2021 (Hardcover, 1st ed. 2021)
Hyuncheol Kim, Kuinam J. Kim
R8,770 Discovery Miles 87 700 Ships in 18 - 22 working days

This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.

Blockchain, Law and Governance (Hardcover, 1st ed. 2021): Benedetta Cappiello, Gherardo Carullo Blockchain, Law and Governance (Hardcover, 1st ed. 2021)
Benedetta Cappiello, Gherardo Carullo
R4,643 Discovery Miles 46 430 Ships in 10 - 15 working days

This volume explores from a legal perspective, how blockchain works. Perhaps more than ever before, this new technology requires us to take a multidisciplinary approach. The contributing authors, which include distinguished academics, public officials from important national authorities, and market operators, discuss and demonstrate how this technology can be a driver of innovation and yield positive effects in our societies, legal systems and economic/financial system. In particular, they present critical analyses of the potential benefits and legal risks of distributed ledger technology, while also assessing the opportunities offered by blockchain, and possible modes of regulating it. Accordingly, the discussions chiefly focus on the law and governance of blockchain, and thus on the paradigm shift that this technology can bring about.

Secure Electronic Voting (Hardcover, 2003 ed.): Dimitris A. Gritzalis Secure Electronic Voting (Hardcover, 2003 ed.)
Dimitris A. Gritzalis
R2,777 Discovery Miles 27 770 Ships in 18 - 22 working days

Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The chapters identify and describe the given capabilities and the strong limitations, as well as the current trends and future perspectives of electronic voting technologies, with emphasis in security and privacy. Secure Electronic Voting includes state-of-the-art material on existing and emerging electronic and Internet voting technologies, which may eventually lead to the development of adequately secure e-voting systems. This book also includes an overview of the legal framework with respect to voting, a description of the user requirements for the development of a secure e-voting system, and a discussion on the relevant technical and social concerns. Secure Electronic Voting includes, also, three case studies on the use and evaluation of e-voting systems in three different real world environments.

Psychology and Law in Europe - When West Meets East (Paperback): Par-Anders Granhag, Ray Bull, Alla Shaboltas, Elena Dozortseva Psychology and Law in Europe - When West Meets East (Paperback)
Par-Anders Granhag, Ray Bull, Alla Shaboltas, Elena Dozortseva
R1,139 Discovery Miles 11 390 Ships in 10 - 15 working days

Offering carefully curated articles from the European Association of Psychology and Law (EAPL), this book features chapters from a truly international group of scholars. This text is the first of its kind to offer insights into current developments in psychology and law in Russia. The field of psychology and law has a very long and strong tradition in Russia, but very little is known, as Russian scholars rarely publish their works in English. The volume also contains state-of-the-art chapters on topics at the very core of psychology and law, including offender profiling, lie detection, crime linking, false memories, and witness interviewing. Features Provides rare insight into Russian history of forensic and criminal psychology Covers core topics in the discipline Offers international scope from a diverse array of contributors Psychology and Law in Europe: When West Meets East is a text of interest for students of psychology, law, or criminal justice, as well as scholars and practitioners in the field. This text offers a window into global advances in psychology and law.

Urbanization, Policing, and Security - Global Perspectives (Paperback): Gary Cordner, AnnMarie Cordner, Dilip K Das Urbanization, Policing, and Security - Global Perspectives (Paperback)
Gary Cordner, AnnMarie Cordner, Dilip K Das
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

In terms of raw numbers, the amount of world urban dwellers have increased four-fold, skyrocketing from 740 million in 1950 to almost 3.3 billion in 2007. This ongoing urbanization will continue to create major security challenges in most countries. Based on contributions from academics and practitioners from countries as diverse as Nigeria, Pakistan, Azerbaijan, and the US, Urbanization, Policing, and Security: Global Perspectives highlights the crime and disorder problems associated with urbanization and demonstrates police and private security responses to those problems. Examines responses to urban problems The book draws on the practical experiences of police officials and the academic insights of researchers from around the world to detail the consequences of urbanization - crime, terrorism, disorder, drugs, traffic crashes - as well as modern responses to those problems. Covering studies on major cities in more than 18 countries, this text explores topics such as the role of urbanization in security and global concerns including transnational crime, racial profiling, and information sharing. The book also examines responses to urban problems associated with police and security, including human rights activism and police reform. The tools to devise sophisticated solutions The problems confronting policing in these times are quite daunting, providing plenty of challenges for police leaders and requiring them to devise increasingly sophisticated solutions. With more than 100 photos and illustrations, the book tackles issues from a different angle. It examines the resources required to solve problems and those necessary to build a knowledge base of policing and the professionalism for police forces.

Retail Security and Loss Prevention Solutions (Paperback): Alan Greggo, Millie Kresevich Retail Security and Loss Prevention Solutions (Paperback)
Alan Greggo, Millie Kresevich
R1,134 Discovery Miles 11 340 Ships in 10 - 15 working days

Employee theft amounts to roughly $36.6 billion retail dollars lost annually, according to a 2008 National Retail Security Survey, and accounts for approximately 42.7 % of all retail losses. Each year organizations spend millions of dollars on theft detection/prevention devices yet still incur losses at the hands of their own employees; begging the question not of how theft occurs, but why. Discussing the concept of the Theft Triangle (opportunity, motivation, and insufficient deterrents), Retail Security and Loss Prevention Solutions investigates motivational factors that contribute to loss and describes philosophies that can change the entire spectrum of employee dishonesty. It cites the revolutionary approach adopted by the New York Subway System, demonstrating that by changing the overall presentation of the business and contending with the factors preceding the crime, the crime itself can be avoided. As the title "Loss Prevention Professional" implies, the intention is to stop the damage before it occurs. To this end, chapters discuss behaviors that precede a loss event, theoretical perspectives and research on employee deviance and motivation, and methods to control employee dishonesty through deterrents as well as ethical infrastructures. Detailing the intricacies of the Loss Prevention Profession and the myriad skills involved such as accounting, forensics, fraud detection, human behavior analysis, and interview/interrogation skills, the authors give advice on how to select the right individuals for the job and how to build a Loss Prevention department. They employ real life case studies and interviews and discuss the problems and solutions for the future of loss prevention as a whole.

Police Corruption - Preventing Misconduct and Maintaining Integrity (Paperback): Tim Prenzler Police Corruption - Preventing Misconduct and Maintaining Integrity (Paperback)
Tim Prenzler
R1,583 Discovery Miles 15 830 Ships in 10 - 15 working days

While many police officers undertake their work conforming to the highest ethical standards, the fact remains that unethical police conduct continues to be a recurring problem around the world. With examples from a range of jurisdictions, Police Corruption: Preventing Misconduct and Maintaining Integrity examines the causes of police misconduct and explores applied strategies designed to maximize ethical conduct and identify and prevent corruption. Analyzes the roots of corruption Introducing the phenomenon of police officer misconduct, the book provides an analysis of unethical behavior, its effects, and different causal factors. The author examines the impact on the community and the police themselves, the dilemma of establishing universal ethical principles, and ways of identifying and measuring misconduct problems. The remainder of the text examines applied strategies designed to maximize ethical conduct and prevent corruption. A myriad of proven strategies Exploring a wide range of approaches, the book discusses best practices in the recruitment of ethical applicants, strategies for dealing with misconduct, risk reduction strategies and early warning and intervention systems, along with advanced strategies such as drug and alcohol testing, integrity tests, and the use of covert surveillance. The text also explores the role of independent external oversight bodies that audit police strategies and conduct their own investigation. The final chapter on ethical leadership emphasizes the need to go beyond a checklist of rules with leadership that values, requires, and models integrity in all aspects of police work. Examples from around the world Taking a global approach, this volume recognizes that policing is prone to the same potential problems of corruption and misconduct everywhere in the world. Highlighting

Financial Crimes - A Threat to Global Security (Paperback): Maximilian Edelbacher, Peter Kratcoski, Michael Theil Financial Crimes - A Threat to Global Security (Paperback)
Maximilian Edelbacher, Peter Kratcoski, Michael Theil
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity-including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the mos

Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Paperback): S. Caroline Taylor, Daniel Joseph... Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Paperback)
S. Caroline Taylor, Daniel Joseph Torpy, Dilip K Das
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

The movement of humans across borders is increasing exponentially-some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling. Consequently, the policing of human movement within and across borders has been and remains a significant concern to nations. Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism explores the nature of these challenges for police, governments, and citizens at large. Drawn from keynote and paper presentations at a recent International Police Executive Symposium meeting in Malta, the book presents the work of scholars and practitioners who analyze a variety of topics on the cutting edge of global policing, including: Western attempts to reform the policing of sex tourists in the Philippines and Gambia Policing the flow of people and goods in the port of Rotterdam Policing protestors and what happened at the 2010 G20 Summit in Toronto Mexico's use of the military in its war against drug trafficking Public-private cooperation in the fight against organized crime and terrorism in Australia Recommendations for police reform in Afghanistan Sweden's national counterterrorism unit Treatment of asylum seekers in a privately run detention center in South Africa The policing of human trafficking for the sex trade in sub-Saharan Africa, Vietnam, Australia, and Andhra Pradesh, India Examining areas of increasing concern to governments and citizens around the world, this timely volume presents critical international perspectives on these ongoing global challenges that threaten the safety of humans worldwide.

State Fragility Around the World - Fractured Justice and Fierce Reprisal (Paperback): Laurie A Gould, Matthew Pate State Fragility Around the World - Fractured Justice and Fierce Reprisal (Paperback)
Laurie A Gould, Matthew Pate
R1,138 Discovery Miles 11 380 Ships in 10 - 15 working days

Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequently use kidnapping, murder, and other violent or oppressive tactics to maintain order and stay in power. State Fragility Around the World: Fractured Justice and Fierce Reprisal analyzes the path to state failure, one manifestation of which appears through the fragility and dysfunction of its criminal justice system. This book examines what happens when a government loses the ability, or will, to provide basic goods and services to its constituents. Acknowledging the tremendous variability of failed and fragile states, the case studies and analyses contained in this book suggest the existence of functional and structural attributes common across most state systems. The authors explore the plights of various states in which key elements related to their criminal justice systems are weak or fragile. States under examination include Mexico, Afghanistan, Iran, Syria, and Georgia. Special attention is given to Somalia, Sudan, and South Sudan, which serve as examples of what happens to a state that fails in virtually all aspects of governance. Using a unique approach, State Fragility Around the World articulates a specific method for assessing relative state fragility. Using this method, natural groupings of relative fragility and stability evolve, providing an unprecedented way to compare social phenomena and functionality across national and regional borders. Readers will also gain a deeper understanding of what it means to be a fragile state as well as how state fragility affects core freedoms, the criminal justice process, and mechanisms of punishment.

Security within CONASENSE Paragon (Hardcover): Ramjee Prasad, Leo P. Ligthart Security within CONASENSE Paragon (Hardcover)
Ramjee Prasad, Leo P. Ligthart
R2,852 Discovery Miles 28 520 Ships in 10 - 15 working days

Security within CONASENSE Paragon describes in particular the cyber security issues in the field of Communication, Navigation, Sensing and Services within the broad platform of CTIF Global Capsule (CGC). This covers future technologies and its enablers, smart cities, crowd computing, reliable and secure communication interface, satellite unnamed air vehicles, wireless sensor networks, data analytics and deep learning, remotely piloted aircraft system and public safety, network neutrality, business ecosystem innovation and so on.

Practical Handbook for Professional Investigators (Paperback, 3rd edition): Randy Dickson, Rory J.  McMahon, CLI, CFE Practical Handbook for Professional Investigators (Paperback, 3rd edition)
Randy Dickson, Rory J. McMahon, CLI, CFE
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

An increase in fraud cases has escalated government accountability and corporate oversight, and media attention on cases ranging from missing persons to white-collar crime has increased the visibility of professional investigators. This has resulted in a great source of increased work for the profession. The third edition of Practical Handbook for Professional Investigators continues to supply an up-to-date, nuts-and-bolts learning tool for students and an everyday reference for investigative professionals at all levels. More relevant than ever, this edition adds two new chapters on death and terrorism investigations and several new sections, including: Insurance fraud, fire and arson investigation, and liability claims investigation Indicators of online marital infidelity Obtaining governmental records to locate people and sample reports for skip tracing Practical considerations for surveillance and procedures for interception of wire or oral communications Service of subpoenas for witnesses in federal courts Testifying in court-including witness and evidence preparation, trial tactics used by attorneys, and an investigator's rights as a witness The Rules of Professional Conduct Niche markets in the investigative industry Managing and marketing an investigative practice, running a paperless office, and customer retention An unparalleled guide to the ins and outs of private investigation, Practical Handbook for Professional Investigators, Third Edition belongs on the shelf of every professional and trainee. Rory McMahon appeared on Al Jazeera America to discuss his new investigation company, The Grafton Group.

The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Hardcover):... The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Hardcover)
Damilare D. Fagbemi, David Wheeler, J.C. Wheeler
R1,998 Discovery Miles 19 980 Ships in 10 - 15 working days

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

Privacy, Data Protection and Cybersecurity in Europe (Hardcover, 1st ed. 2017): Wolf J. Schunemann, Max-Otto Baumann Privacy, Data Protection and Cybersecurity in Europe (Hardcover, 1st ed. 2017)
Wolf J. Schunemann, Max-Otto Baumann
R2,408 Discovery Miles 24 080 Ships in 10 - 15 working days

This book offers a comparative perspective on data protection and cybersecurity in Europe. In light of the digital revolution and the implementation of social media applications and big data innovations, it analyzes threat perceptions regarding privacy and cyber security, and examines socio-political differences in the fundamental conceptions and narratives of privacy, and in data protection regimes, across various European countries. The first part of the book raises fundamental legal and ethical questions concerning data protection; the second analyses discourses on cybersecurity and data protection in various European countries; and the third part discusses EU regulations and norms intended to create harmonized data protection regimes.

Resilient Space Systems Design - An Introduction (Hardcover): Ron Burch Resilient Space Systems Design - An Introduction (Hardcover)
Ron Burch
R3,643 Discovery Miles 36 430 Ships in 10 - 15 working days

Recognized as a "Recommended" title by Choice for their November 2020 issue. Choice is a publishing unit at the Association of College & Research Libraries (ACR&L), a division of the American Library Association. Choice has been the acknowledged leader in the provision of objective, high-quality evaluations of nonfiction academic writing. Presenting a fundamental definition of resilience, the book examines the concept of resilience as it relates to space system design. The book establishes the required definitions, relates its place to existing state-of-the-art systems engineering practices, and explains the process and mathematical tools used to achieve a resilient design. It discusses a variety of potential threats and their impact upon a space system. By providing multiple, real-world examples to illustrate the application of the design methodology, the book covers the necessary techniques and tools, while guiding the reader through the entirety of the process. The book begins with space systems basics to ensure the reader is versed in the functions and components of the system prior to diving into the details of resilience. However, the text does not assume that the reader has an extensive background in the subject matter of resilience. This book is aimed at engineers and architects in the areas of aerospace, space systems, and space communications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Cyber Security and Safety of Nuclear…
Michael A. Yastrebenetsky, Vyacheslav S. Kharchenko Hardcover R5,379 Discovery Miles 53 790
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520

 

Partners