0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,156)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R4,796 Discovery Miles 47 960 Ships in 10 - 15 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Nature-Inspired Cyber Security and Resiliency - Fundamentals, techniques and applications (Hardcover): El-Sayed M El-Alfy,... Nature-Inspired Cyber Security and Resiliency - Fundamentals, techniques and applications (Hardcover)
El-Sayed M El-Alfy, Mohamed Eltoweissy, Errin W. Fulp, Wojciech Mazurczyk
R3,546 R3,199 Discovery Miles 31 990 Save R347 (10%) Ships in 18 - 22 working days

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions. Computing algorithms have been developed to mimic the operation of natural processes, phenomena and organisms such as artificial neural networks, swarm intelligence, deep learning systems, biomimicry, and more. The amazing characteristics of these systems offer a plethora of novel methodologies and opportunities to cope with emerging cyber challenges. This edited book presents a timely review of the fundamentals, latest developments and diverse applications of nature-inspired algorithms in cyber security and resiliency. Topics include bio-inspired collaboration and cyber security; immune-based defense and resiliency; bio-inspired security and resiliency of network traffic; nature inspired machine learning approach for cyber security; nature-inspired algorithms in A.I. for malicious activity detection; DNA-inspired characterization and detection of novel social Twitter spambots; nature-inspired approaches for social network security; bio-inspired cyber-security for smart grid; nature-inspired cryptography and cryptanalysis, and more.

Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R1,045 Discovery Miles 10 450 Ships in 10 - 15 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Strategies and Responses to Crime - Thinking Locally, Acting Globally (Paperback): Melchor de Guzman, Aiedeo Mintie Das, Dilip... Strategies and Responses to Crime - Thinking Locally, Acting Globally (Paperback)
Melchor de Guzman, Aiedeo Mintie Das, Dilip K Das
R2,247 Discovery Miles 22 470 Ships in 10 - 15 working days

Every year, esteemed scholars and practitioners meet at the International Police Executive Symposium to discuss contemporary issues in policing and share ideas about effective strategies in their jurisdictions. Drawn from the proceedings at the Thirteenth Annual Meeting held in Turkey and updated with new developments since the conference, Strategic Responses to Crime: Thinking Locally, Acting Globally describes how local police agencies are addressing issues of crime that have global implications. With contributions from a diverse panel of experts, the book combines scholarly perspectives with those of practitioners and explores issues in various cultural settings worldwide. Topics discussed include: Community policing and police innovations such as safety and security councils Performance management systems in police organizations Efforts to combat drug cultivation and trafficking International terrorism and individuals' motivations for joining terrorist organizations Approaches for handling and policing the mentally ill in accordance with human rights concerns Cybercrime and child sexual abuse Crime scene assessment, information gathering, and case development and management Jurisprudence, law, and empirical research related to racial profiling in the United States Computer technology and crime analysis tools and models Emerging police administration strategies Combining empirical evidence from scholarly studies with in-the-trenches experience from practitioners, this volume assembles critical insight into a range of issues relevant to policing in the 21st century.

Building A Global Information Assurance Program (Hardcover): Douglas E. Campbell, Raymond J. Curts Building A Global Information Assurance Program (Hardcover)
Douglas E. Campbell, Raymond J. Curts
R4,806 Discovery Miles 48 060 Ships in 10 - 15 working days

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,785 Discovery Miles 47 850 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,068 Discovery Miles 50 680 Ships in 10 - 15 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Coastal Lagoons - Critical Habitats of Environmental Change (Paperback): Michael J. Kennish, Hans W. Paerl Coastal Lagoons - Critical Habitats of Environmental Change (Paperback)
Michael J. Kennish, Hans W. Paerl
R2,237 Discovery Miles 22 370 Ships in 10 - 15 working days

Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agricultural, and urban waste, overuse from fisheries, aquaculture, transportation, energy production, and other human activities. The features that make coastal lagoons vital ecosystems underline the importance of sound management strategies for long-term environmental and resource sustainability. Written by an internationally renowned group of contributors, Coastal Lagoons: Critical Habitats of Environmental Change examines the function and structure of coastal lagoonal ecosystems and the natural and anthropogenic drivers of change that affect them. The contributors examine the susceptibility of coastal lagoons to eutrophication, the indicators of eutrophic conditions, the influences of natural factors such as major storms, droughts and other climate effects, and the resulting biotic and ecosystem impairments that have developed worldwide. They provide detailed descriptions of the physical-chemical and biotic characteristics of diverse coastal lagoonal ecosystems, and address the environmental factors, forcing features, and stressors affecting hydrologic, biogeochemical, and trophic properties of these important water bodies. They also discuss the innovative tools and approaches used for assessing ecological change in the context of anthropogenically- and climatically-mediated factors. The book investigates the biogeochemical and ecological responses to nutrient enrichment and other pollutants in lagoonal estuaries and compares them to those in other estuarine types. With editors among the most noted international scholars in coastal ecology and contributors who are world-class in their fields, the chapters in this volume represent a wide array of studies on natural and anthropogenic drivers of change in coastal lagoons located in different regions of the world. Although a significant number of journal articles on the subject can be found in the literature, this book provides a single-source reference for coastal lagoons within the arena of the global environment.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,848 Discovery Miles 48 480 Ships in 10 - 15 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Cybersecurity and Privacy - bridging the gap (Hardcover): Samant Khajuria, Lene Sorensen, Knud Erik Skouby Cybersecurity and Privacy - bridging the gap (Hardcover)
Samant Khajuria, Lene Sorensen, Knud Erik Skouby
R2,323 R2,152 Discovery Miles 21 520 Save R171 (7%) Ships in 10 - 15 working days

The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: * Cybersecurity * Encryption * Privacy policy * Trust * Security and Internet of Things * Botnets * Data risks * Cloudbased Services * Visualization

Artificial Intelligence and National Security (Hardcover, 1st ed. 2022): Reza Montasari Artificial Intelligence and National Security (Hardcover, 1st ed. 2022)
Reza Montasari
R2,893 Discovery Miles 28 930 Ships in 18 - 22 working days

This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.

Security for Wireless Sensor Networks using Identity-Based Cryptography (Paperback): Harsh Kupwade Patil, Stephen A. Szygenda Security for Wireless Sensor Networks using Identity-Based Cryptography (Paperback)
Harsh Kupwade Patil, Stephen A. Szygenda
R1,438 Discovery Miles 14 380 Ships in 10 - 15 working days

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.

Multimedia Security - Watermarking, Steganography, and Forensics (Paperback): Frank Y. Shih Multimedia Security - Watermarking, Steganography, and Forensics (Paperback)
Frank Y. Shih
R2,536 Discovery Miles 25 360 Ships in 10 - 15 working days

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different aspects of information security mechanisms and methods, this resource also serves as an instructional tool on how to use the fundamental theoretical framework required for the development of extensive advanced techniques. The presentation of several robust algorithms illustrates this framework, helping readers to quickly master and apply fundamental principles. Presented case studies cover: The execution (and feasibility) of techniques used to discover hidden knowledge by applying multimedia duplicate mining methods to large multimedia content Different types of image steganographic schemes based on vector quantization Techniques used to detect changes in human motion behavior and to classify different types of small-group motion behavior Useful for students, researchers, and professionals, this book consists of a variety of technical tutorials that offer an abundance of graphs and examples to powerfully convey the principles of multimedia security and steganography. Imparting the extensive experience of the contributors, this approach simplifies problems, helping readers more easily understand even the most complicated theories. It also enables them to uncover novel concepts involved in the implementation of algorithms, which can lead to the discovery of new problems and new means of solving them.

Cyber Warfare - A Multidisciplinary Analysis (Paperback): James A. Green Cyber Warfare - A Multidisciplinary Analysis (Paperback)
James A. Green
R1,355 Discovery Miles 13 550 Ships in 10 - 15 working days

This book is a multi-disciplinary analysis of cyber warfare, featuring contributions by leading experts from a mixture of academic and professional backgrounds. Cyber warfare, meaning interstate cyber aggression, is an increasingly important emerging phenomenon in international relations, with state-orchestrated (or apparently state-orchestrated) computer network attacks occurring in Estonia (2007), Georgia (2008) and Iran (2010). This method of waging warfare - given its potential to, for example, make planes fall from the sky or cause nuclear power plants to melt down - has the capacity to be as devastating as any conventional means of conducting armed conflict. Every state in the world now has a cyber-defence programme and over 120 states also have a cyber-attack programme. While the amount of literature on cyber warfare is growing within disciplines, our understanding of the subject has been limited by a lack of cross-disciplinary engagement. In response, this book, drawn from the fields of computer science, military strategy, international law, political science and military ethics, provides a critical overview of cyber warfare for those approaching the topic from whatever angle. Chapters consider the emergence of the phenomena of cyber warfare in international affairs; what cyber-attacks are from a technological standpoint; the extent to which cyber-attacks can be attributed to state actors; the strategic value and danger posed by cyber conflict; the legal regulation of cyber-attacks, both as international uses of force and as part of an on-going armed conflict, and the ethical implications of cyber warfare. This book will be of great interest to students of cyber warfare, cyber security, military ethics, international law, security studies and IR in general.

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems - The SHIELD Methodology (Paperback):... Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems - The SHIELD Methodology (Paperback)
Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria
R1,880 Discovery Miles 18 800 Ships in 10 - 15 working days

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIELD philosophy, that relies on an overlay approach to SPD, on a methodology for composable SPD, on the use of semantics, and on the design of embedded systems with built-in SPD. The book explores new ground and illustrates the development of approximately forty prototypes capable of managing and enhancing SPD, including secure boot, trusted execution environments, adaptable radio interfaces, and different implementations of the middleware for measuring and composing SPD.

Case Studies in Secure Computing - Achievements and Trends (Paperback): Biju Issac, Nauman Israr Case Studies in Secure Computing - Achievements and Trends (Paperback)
Biju Issac, Nauman Israr
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book: Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks Investigates various malicious activities associated with cloud computing and proposes some countermeasures Examines current and emerging security threats in long-term evolution backhaul and core networks Supplies a brief introduction to application-layer denial-of-service (DoS) attacks Illustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon. This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.

Security, Privacy and Reliability in Computer Communications and Networks (Hardcover): Kewei Sha, Aaron Striegel, Min Song Security, Privacy and Reliability in Computer Communications and Networks (Hardcover)
Kewei Sha, Aaron Striegel, Min Song
R2,450 Discovery Miles 24 500 Ships in 10 - 15 working days

Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability. Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed in the book include: Vulnerabilities and Intrusion Detection Cryptographic Algorithms and Evaluation Privacy Reliable Routing Protocols This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.

Securing the Cloud - Security Strategies for the Ubiquitous Data Center (Paperback): Curtis Franklin Jr., Brian Chee Securing the Cloud - Security Strategies for the Ubiquitous Data Center (Paperback)
Curtis Franklin Jr., Brian Chee
R1,385 Discovery Miles 13 850 Ships in 10 - 15 working days

This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.

AI-Enabled Threat Detection and Security Analysis for Industrial IoT (Hardcover, 1st ed. 2021): Hadis Karimipour, Farnaz... AI-Enabled Threat Detection and Security Analysis for Industrial IoT (Hardcover, 1st ed. 2021)
Hadis Karimipour, Farnaz Derakhshan
R4,257 Discovery Miles 42 570 Ships in 18 - 22 working days

This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data security, privacy and application of blockchain technology in the IIoT environment. This book also examines more advanced and specific topics in AI-based solutions developed for efficient anomaly detection in IIoT environments. Different AI/ML techniques including deep representation learning, Snapshot Ensemble Deep Neural Network (SEDNN), federated learning and multi-stage learning are discussed and analysed as well. Researchers and professionals working in computer security with an emphasis on the scientific foundations and engineering techniques for securing IIoT systems and their underlying computing and communicating systems will find this book useful as a reference. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, cyber security, and information systems. It also applies to advanced-level students studying electrical engineering and system engineering, who would benefit from the case studies.

Kish Cypher, The: The Story Of Kljn For Unconditional Security (Hardcover): Laszlo B. Kish Kish Cypher, The: The Story Of Kljn For Unconditional Security (Hardcover)
Laszlo B. Kish
R4,040 Discovery Miles 40 400 Ships in 18 - 22 working days

Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.This book clarifies the misinformation behind heated debates on the 'Kish Cypher' (the popular but incorrect name for the Kirchhoff-Law-Johnson-Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle - an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost.The contents of this text address both layman and expert levels of understanding.

Network and Data Security for Non-Engineers (Paperback): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Paperback)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R2,151 Discovery Miles 21 510 Ships in 10 - 15 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018): Tongtong Li, Tianlong Song,... Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018)
Tongtong Li, Tianlong Song, Yuan Liang
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

AI-Centric Smart City Ecosystems - Technologies, Design and Implementation (Hardcover): Alex Khang, Sita Rani, Arun Kumar... AI-Centric Smart City Ecosystems - Technologies, Design and Implementation (Hardcover)
Alex Khang, Sita Rani, Arun Kumar Sivaraman
R3,520 Discovery Miles 35 200 Ships in 10 - 15 working days

Explains smart city ecosystem and AI-centric solutions Presents the application of design principles and computer vision models for operating smart cities and security systems Discusses how to integrate the AI-based controls systems to make the IoT devices smarter Explains data engineering and visualization patterns for monitoring smart city systems Discusses self-driving car models and transportation infrastructures

Advances in Biometrics for Secure Human Authentication and Recognition (Paperback): Dakshina Ranjan Kisku, Phalguni Gupta,... Advances in Biometrics for Secure Human Authentication and Recognition (Paperback)
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
R1,652 Discovery Miles 16 520 Ships in 10 - 15 working days

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human authentication and recognition. Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional techniques as well as novel systems that have been developed over the past few years. It presents new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Filled with comprehensive graphical and modular illustrations, the text covers applications of affective computing in biometrics, matching sketch to photograph, cryptography approaches in biometrics, biometrics alteration, heterogeneous biometrics, and age invariant biometrics. It also presents biometrics algorithms with novel feature extraction techniques, computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Containing the work of some of the world's most respected biometrics researchers, the book includes model question papers, mathematical notations, and exercises to reinforce understanding. Providing an up-to-date review of intelligence techniques and theories used in biometric technologies for secure human authentication and identification, this is an essential reference for researchers, scholars, graduate students, engineers, practitioners, and developers in the field of biometrics and its related fields.

The CISO Journey - Life Lessons and Concepts to Accelerate Your Professional Development (Paperback): Eugene Fredriksen The CISO Journey - Life Lessons and Concepts to Accelerate Your Professional Development (Paperback)
Eugene Fredriksen
R1,384 Discovery Miles 13 840 Ships in 10 - 15 working days

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a "Rule of Information Security" developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Breaches and Threat Prevention…
N. Jeyanthi, R. Thandeeswaran Hardcover R4,514 Discovery Miles 45 140
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000

 

Partners