0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,154)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Security and Privacy in Smart Grids (Paperback): Yang Xiao Security and Privacy in Smart Grids (Paperback)
Yang Xiao
R1,737 Discovery Miles 17 370 Ships in 10 - 15 working days

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today's smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book's chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.

Multilevel Security for Relational Databases (Paperback): Osama S Faragallah, El-Sayed M.  El-Rabaie, Fathi E. Abd El-Samie,... Multilevel Security for Relational Databases (Paperback)
Osama S Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I Sallam, Hala S El-Sayed
R1,787 Discovery Miles 17 870 Ships in 10 - 15 working days

Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.

Artificial Intelligence Safety and Security (Hardcover): Roman V. Yampolskiy Artificial Intelligence Safety and Security (Hardcover)
Roman V. Yampolskiy
R3,888 Discovery Miles 38 880 Ships in 18 - 22 working days

The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure that they do not turn on us, its inventors. Numerous recent advancements in all aspects of research, development and deployment of intelligent systems are well publicized but safety and security issues related to AI are rarely addressed. This book is proposed to mitigate this fundamental problem. It is comprised of chapters from leading AI Safety researchers addressing different aspects of the AI control problem as it relates to the development of safe and secure artificial intelligence. The book is the first edited volume dedicated to addressing challenges of constructing safe and secure advanced machine intelligence. The chapters vary in length and technical content from broad interest opinion essays to highly formalized algorithmic approaches to specific problems. All chapters are self-contained and could be read in any order or skipped without a loss of comprehension.

Data Science For Cyber-security (Hardcover): Nicholas A Heard, Niall M Adams, Patrick Rubin-delanchy, Mellisa Turcotte Data Science For Cyber-security (Hardcover)
Nicholas A Heard, Niall M Adams, Patrick Rubin-delanchy, Mellisa Turcotte
R2,856 Discovery Miles 28 560 Ships in 18 - 22 working days

Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.The application of statistical and broader data science techniques provides an exciting growth area in the design of cyber defences. Networks of connected devices, such as enterprise computer networks or the wider so-called Internet of Things, are all vulnerable to misuse and attack, and data science methods offer the promise to detect such behaviours from the vast collections of cyber traffic data sources that can be obtained. In many cases, this is achieved through anomaly detection of unusual behaviour against understood statistical models of normality.This volume presents contributed papers from an international conference of the same name held at Imperial College. Experts from the field have provided their latest discoveries and review state of the art technologies.

The Science of Biometrics - Security Technology for Identity Verification (Hardcover): Ravindra Das The Science of Biometrics - Security Technology for Identity Verification (Hardcover)
Ravindra Das
R5,061 Discovery Miles 50 610 Ships in 10 - 15 working days

The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review. This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.

Power Analysis Attacks - Revealing the Secrets of Smart Cards (Hardcover, 2007 ed.): Stefan Mangard, Elisabeth Oswald, Thomas... Power Analysis Attacks - Revealing the Secrets of Smart Cards (Hardcover, 2007 ed.)
Stefan Mangard, Elisabeth Oswald, Thomas Popp
R4,882 Discovery Miles 48 820 Ships in 18 - 22 working days

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, this volume provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles.

By analyzing the pros and cons of the different countermeasures, Power Analysis Attacks: Revealing the Secrets of Smart Cards allows practitioners to decide how to protect smart cards. This book also provides valuable information for advanced-level students, and researchers working in information security.

QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020): K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020)
K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs). Unlike other books on the topic, it focuses on the networking aspects of WSNs, discussing the most important networking issues, including network architecture design, medium access control, routing and data dissemination, node clustering, node localization, query processing, data aggregation, transport and quality of service, time synchronization, and network security. Featuring contributions from researchers, this book strikes a balance between fundamental concepts and new technologies, providing readers with unprecedented insights into WSNs from a networking perspective. It is essential reading for a broad audience, including academics, research engineers, and practitioners, particularly postgraduate/postdoctoral researchers and engineers in industry. It is also suitable as a textbook or supplementary reading for graduate computer engineering and computer science courses.

Guide to Computer Forensics and Investigations (Paperback, 6th edition): Amelia Phillips, Bill Nelson, Christopher Steuart Guide to Computer Forensics and Investigations (Paperback, 6th edition)
Amelia Phillips, Bill Nelson, Christopher Steuart
R1,345 R1,248 Discovery Miles 12 480 Save R97 (7%) Ships in 10 - 15 working days

Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides free demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.

Hacker Culture and the New Rules of Innovation (Paperback): Tim Rayner Hacker Culture and the New Rules of Innovation (Paperback)
Tim Rayner
R1,174 Discovery Miles 11 740 Ships in 10 - 15 working days

Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.

New Dimensions of Information Warfare (Hardcover, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Hardcover, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,259 Discovery Miles 42 590 Ships in 18 - 22 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

Enterprise Identity Management - Towards an Investment Decision Support Approach (Hardcover, 2013 ed.): Denis Royer Enterprise Identity Management - Towards an Investment Decision Support Approach (Hardcover, 2013 ed.)
Denis Royer
R3,337 Discovery Miles 33 370 Ships in 10 - 15 working days

The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented.

Hacker Culture and the New Rules of Innovation (Hardcover): Tim Rayner Hacker Culture and the New Rules of Innovation (Hardcover)
Tim Rayner
R4,202 Discovery Miles 42 020 Ships in 10 - 15 working days

Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.

Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition): William (Chuck) Easttom Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition)
William (Chuck) Easttom
R1,991 Discovery Miles 19 910 Ships in 10 - 15 working days

All you need to know about defending networks, in one book * Clearly explains concepts, terminology, challenges, tools, and skills * Covers key security standards and models for business and government * The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career. Learn How To * Evaluate key network risks and dangers * Choose the right network security approach for your organization * Anticipate and counter widespread network attacks, including those based on "social engineering" * Successfully deploy and apply firewalls and intrusion detection systems * Secure network communication with virtual private networks * Protect data with cryptographic public/private key systems, digital signatures, and certificates * Defend against malware, including ransomware, Trojan horses, and spyware * Harden operating systems and keep their security up to date * Define and implement security policies that reduce risk * Explore leading security standards and models, including ISO and NIST standards * Prepare for an investigation if your network has been attacked * &nb

Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function... Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function Evaluation (Paperback, 2012 ed.)
Thomas Schneider
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.

Understanding Cybersecurity Management in FinTech - Challenges, Strategies, and Trends (Hardcover, 1st ed. 2021): Gurdip Kaur,... Understanding Cybersecurity Management in FinTech - Challenges, Strategies, and Trends (Hardcover, 1st ed. 2021)
Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari
R2,372 Discovery Miles 23 720 Ships in 10 - 15 working days

This book uncovers the idea of understanding cybersecurity management in FinTech. It commences with introducing fundamentals of FinTech and cybersecurity to readers. It emphasizes on the importance of cybersecurity for financial institutions by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in FinTech. The book helps readers understand cyber threat landscape comprising different threat categories that can exploit different types of vulnerabilties identified in FinTech. It puts forward prominent threat modelling strategies by focusing on attackers, assets, and software and addresses the challenges in managing cyber risks in FinTech. The authors discuss detailed cybersecurity policies and strategies that can be used to secure financial institutions and provide recommendations to secure financial institutions from cyber-attacks.

Security in Network Functions Virtualization (Hardcover): Zonghua Zhang, Ahmed Meddahi Security in Network Functions Virtualization (Hardcover)
Zonghua Zhang, Ahmed Meddahi
R2,805 R2,635 Discovery Miles 26 350 Save R170 (6%) Ships in 10 - 15 working days

The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.

150 Things You Should Know about Security (Paperback, 2nd edition): Lawrence Fennelly, Marianna Perry 150 Things You Should Know about Security (Paperback, 2nd edition)
Lawrence Fennelly, Marianna Perry
R1,498 Discovery Miles 14 980 Ships in 10 - 15 working days

150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest trends in physical security. This indispensable guide further covers the latest technological trends for managing the security needs of all kinds, from physical and corporate security, to the latest cybersecurity threats. Through anecdotes, case studies, and documented procedures, the authors have amassed the most complete collection of information on security available. Security professionals will find this book easy to use and understand when seeking practical tips for managing the latest security technologies, such as bio-metrics, IP video, video analytics, and more. Several themes have been included, such as management principles and styles, communications, security applications, investigations, technology, physical security, the future, and many more. In addition, tips for quantifying the reduction and prevention of crime, loss and liability risks are included, assisting security professionals in securing corporate resources for security manpower and infrastructure.

Ethical Hacking and Penetration Testing Guide (Hardcover): Rafay Baloch Ethical Hacking and Penetration Testing Guide (Hardcover)
Rafay Baloch
R5,071 Discovery Miles 50 710 Ships in 10 - 15 working days

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Responsive Security - Be Ready to Be Secure (Hardcover): Meng Chow Kang Responsive Security - Be Ready to Be Secure (Hardcover)
Meng Chow Kang
R5,207 Discovery Miles 52 070 Ships in 10 - 15 working days

Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, this book introduces the issues and dilemmas that fueled the study, discusses its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach. Demonstrates the viability and practicality of the approach in today's information security risk environment Demystifies information security risk management in practice, and reveals the limitations and inadequacies of current approaches Provides comprehensive coverage of the issues and challenges faced in managing information security risks today The author reviews existing literature that synthesizes current knowledge, supports the need for, and highlights the significance of the responsive security approach. He also highlights the concepts, strategies, and programs commonly used to achieve information security in organizations. Responsive Security: Be Ready to Be Secure examines the theories and knowledge in current literature, as well as the practices, related issues, and dilemmas experienced during the study. It discusses the reflexive analysis and interpretation involved in the final research cycles, and validates and refines the concepts, framework, and methodology of a responsive security approach for managing information security risk in a constantly changing risk environment.

Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer... Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers (Hardcover, 1st ed. 2018)
Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hubner
R2,915 Discovery Miles 29 150 Ships in 10 - 15 working days

This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017. The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy.

Combatting Cybercrime and Cyberterrorism - Challenges, Trends and Priorities (Hardcover, 1st ed. 2016): Babak Akhgar, Ben... Combatting Cybercrime and Cyberterrorism - Challenges, Trends and Priorities (Hardcover, 1st ed. 2016)
Babak Akhgar, Ben Brewster
R4,086 Discovery Miles 40 860 Ships in 10 - 15 working days

This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues. Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT. This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.

Internet of Things and Cyber Physical Systems - Security and Forensics (Hardcover): Keshav Kaushik, Susheela Dahiya, Akashdeep... Internet of Things and Cyber Physical Systems - Security and Forensics (Hardcover)
Keshav Kaushik, Susheela Dahiya, Akashdeep Bhardwaj, Yassine Maleh
R1,882 Discovery Miles 18 820 Ships in 10 - 15 working days

- Concentrates on the sustainable applications of the IoT and CPS Forensics across multiple latest computational knowledge domains. - Covers the feasible and practical collaboration of IoT and CPS with the latest Sustainable Smart Computing Technologies. - Ideally designed for policymakers, students, researchers, academicians, and professionals who are looking for current research that is interested in exploring and implementing IoT and CPS Forensics strategies.

Anomaly Detection Principles and Algorithms (Hardcover, 1st ed. 2017): Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang Anomaly Detection Principles and Algorithms (Hardcover, 1st ed. 2017)
Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang
R2,613 R1,899 Discovery Miles 18 990 Save R714 (27%) Ships in 10 - 15 working days

This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.

Get Certified - A Guide to Wireless Communication Engineering Technologies (Paperback): Syed A. Ahson, Mohammad Ilyas Get Certified - A Guide to Wireless Communication Engineering Technologies (Paperback)
Syed A. Ahson, Mohammad Ilyas
R2,202 Discovery Miles 22 020 Ships in 10 - 15 working days

The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry's growing need for communications professionals with practical problem-solving skills in real-world situations. Individuals who achieve this prestigious certification are recognized as possessing the required knowledge, skill, and abilities to meet wireless challenges in various industry, business, corporate, and organizational settings. Presenting contributions from 50 wireless communications experts from all corners of the world, Get Certified: A Guide to Wireless Communication Engineering Technologies provides an authoritative review of the seven areas of expertise covered on WCET exam. It supplies cutting-edge coverage of the broad range of topics related to wireless communications to facilitate the technical competency required to achieve certification. The text outlines industry agreements, standards, policies, and regulations including licenses and permits, health and safety, and compliance. With coverage ranging from basic concepts to research-grade material and future directions, the book provides a general overview of the evolution of wireless technologies, their impact on the profession, and common professional best practices. The book's well-structured presentation along with suggestions for further information and study, make it an indispensible guide for attaining WCET certification and a comprehensive source of reference for wireless professionals to keep pace with ever-evolving technology and standards in the field.

Pervasive Information Security and Privacy Developments - Trends and Advancements (Hardcover, New): Hamid R. Nemati Pervasive Information Security and Privacy Developments - Trends and Advancements (Hardcover, New)
Hamid R. Nemati
R4,629 Discovery Miles 46 290 Ships in 18 - 22 working days

Pervasive Information Security and Privacy Developments: Trends and Advancements compiles research on topics such as technical, regulatory, organizational, managerial, cultural, ethical, and human aspects of information security and privacy. This reference offers methodologies, research frameworks, theory development and validation, case studies, simulations, technological architectures, infrastructure issues in design, and implementation of secure and privacy preserving initiatives.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Secure Cyber-Physical Systems for Smart…
Riaz Ahmed Shaikh Hardcover R5,572 Discovery Miles 55 720
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Handbook of Research on Technical…
Amit Kumar Tyagi Hardcover R8,044 Discovery Miles 80 440
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R947 R826 Discovery Miles 8 260
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310

 

Partners