0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,094)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Intelligent Information Processing IX - 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22,... Intelligent Information Processing IX - 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings (Hardcover, 1st ed. 2018)
Zhongzhi Shi, Eunika Mercier-Laurent, Jiuyong Li
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2018, held in Nanning, China, in October 2018. The 37 full papers and 8 short papers presented were carefully reviewed and selected from 80 submissions. They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.

Cyber Security Innovation for the Digital Economy - A Case Study of the Russian Federation (Hardcover): Sergei Petrenko Cyber Security Innovation for the Digital Economy - A Case Study of the Russian Federation (Hardcover)
Sergei Petrenko
R2,566 Discovery Miles 25 660 Ships in 10 - 15 working days

Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and "computational cognitivism," involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: - Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy - Determination of the limiting capabilities - Possible scientific and technical solutions - Organization of perspective research studies in the area of Digital Economy cyber security in Russia

Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover): Kai Rannenberg, Jan Camenisch, Ahmad... Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover)
Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
R3,518 Discovery Miles 35 180 Ships in 10 - 15 working days

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover): Omar Santos Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide (Hardcover)
Omar Santos
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days

Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide presents you with an organised test-preparation routine using proven series elements and techniques. Do I Know This Already? quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Master Cisco CyberOps Associate CBROPS 200-201 exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions in the practice test software Cisco CyberOps Associate CBROPS 200-201 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Leading Cisco technology expert Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A video mentoring lesson from the authors Complete Video Course A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organise and optimise your study time

Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017): Richard Jiang,... Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017)
Richard Jiang, Somaya Al-Maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi
R4,834 Discovery Miles 48 340 Ships in 10 - 15 working days

This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.

Power Analysis Attacks - Revealing the Secrets of Smart Cards (Hardcover, 2007 ed.): Stefan Mangard, Elisabeth Oswald, Thomas... Power Analysis Attacks - Revealing the Secrets of Smart Cards (Hardcover, 2007 ed.)
Stefan Mangard, Elisabeth Oswald, Thomas Popp
R4,882 Discovery Miles 48 820 Ships in 18 - 22 working days

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis as well as advanced techniques like template attacks. Furthermore, this volume provides an extensive discussion of countermeasures like shuffling, masking, and DPA-resistant logic styles.

By analyzing the pros and cons of the different countermeasures, Power Analysis Attacks: Revealing the Secrets of Smart Cards allows practitioners to decide how to protect smart cards. This book also provides valuable information for advanced-level students, and researchers working in information security.

Practical Risk Management for the CIO (Paperback): Mark  Scherling Practical Risk Management for the CIO (Paperback)
Mark Scherling
R1,828 Discovery Miles 18 280 Ships in 10 - 15 working days

The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invisible until disaster strikes. Detailing procedures to help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through improvements to information management and information security. It provides easy-to-follow guidance on how to effectively manage the flow of information and incorporate both service delivery and reliability. Explains why every CIO should be managing his or her information differently Provides time-tested risk ranking strategies Considers information security strategy standards such as NIST, FISMA, PCI, SP 800, & ISO 17799 Supplies steps for managing: information flow, classification, controlled vocabularies, life cycle, and data leakage Describes how to put it all together into a complete information risk management framework Information is one of your most valuable assets. If you aren't on the constant lookout for better ways to manage it, your organization will inevitably suffer. Clarifying common misunderstandings about the risks in cyberspace, this book provides the foundation required to make more informed decisions and effectively manage, protect, and deliver information to your organization and its constituents.

Data Science For Cyber-security (Hardcover): Nicholas A Heard, Niall M Adams, Patrick Rubin-delanchy, Mellisa Turcotte Data Science For Cyber-security (Hardcover)
Nicholas A Heard, Niall M Adams, Patrick Rubin-delanchy, Mellisa Turcotte
R2,856 Discovery Miles 28 560 Ships in 18 - 22 working days

Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.The application of statistical and broader data science techniques provides an exciting growth area in the design of cyber defences. Networks of connected devices, such as enterprise computer networks or the wider so-called Internet of Things, are all vulnerable to misuse and attack, and data science methods offer the promise to detect such behaviours from the vast collections of cyber traffic data sources that can be obtained. In many cases, this is achieved through anomaly detection of unusual behaviour against understood statistical models of normality.This volume presents contributed papers from an international conference of the same name held at Imperial College. Experts from the field have provided their latest discoveries and review state of the art technologies.

Multilevel Security for Relational Databases (Paperback): Osama S Faragallah, El-Sayed M.  El-Rabaie, Fathi E. Abd El-Samie,... Multilevel Security for Relational Databases (Paperback)
Osama S Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I Sallam, Hala S El-Sayed
R1,871 Discovery Miles 18 710 Ships in 10 - 15 working days

Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database-illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilevel secure database models. The book supplies a complete view of an encryption-based multilevel security database model that integrates multilevel security for the relational database with a system that encrypts each record with an encryption key according to its security class level. This model will help you utilize an encryption system as a second security layer over the multilevel security layer for the database, reduce the multilevel database size, and improve the response time of data retrieval from the multilevel database. Considering instance-based multilevel database security, the book covers relational database access controls and examines concurrency control in multilevel database security systems. It includes database encryption algorithms, simulation programs, and Visual studio and Microsoft SQL Server code.

QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020): K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020)
K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs). Unlike other books on the topic, it focuses on the networking aspects of WSNs, discussing the most important networking issues, including network architecture design, medium access control, routing and data dissemination, node clustering, node localization, query processing, data aggregation, transport and quality of service, time synchronization, and network security. Featuring contributions from researchers, this book strikes a balance between fundamental concepts and new technologies, providing readers with unprecedented insights into WSNs from a networking perspective. It is essential reading for a broad audience, including academics, research engineers, and practitioners, particularly postgraduate/postdoctoral researchers and engineers in industry. It is also suitable as a textbook or supplementary reading for graduate computer engineering and computer science courses.

Cyber Security Awareness for CEOs and Management (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for CEOs and Management (Paperback)
David Willson, Henry Dalziel
R1,104 Discovery Miles 11 040 Ships in 10 - 15 working days

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,807 Discovery Miles 18 070 Ships in 10 - 15 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Artificial Intelligence Safety and Security (Hardcover): Roman V. Yampolskiy Artificial Intelligence Safety and Security (Hardcover)
Roman V. Yampolskiy
R4,114 Discovery Miles 41 140 Ships in 18 - 22 working days

The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure that they do not turn on us, its inventors. Numerous recent advancements in all aspects of research, development and deployment of intelligent systems are well publicized but safety and security issues related to AI are rarely addressed. This book is proposed to mitigate this fundamental problem. It is comprised of chapters from leading AI Safety researchers addressing different aspects of the AI control problem as it relates to the development of safe and secure artificial intelligence. The book is the first edited volume dedicated to addressing challenges of constructing safe and secure advanced machine intelligence. The chapters vary in length and technical content from broad interest opinion essays to highly formalized algorithmic approaches to specific problems. All chapters are self-contained and could be read in any order or skipped without a loss of comprehension.

Security and Privacy in Smart Grids (Paperback): Yang Xiao Security and Privacy in Smart Grids (Paperback)
Yang Xiao
R1,822 Discovery Miles 18 220 Ships in 10 - 15 working days

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas-making it an ideal reference for students, researchers, and engineers in these fields. The book explains grid security development and deployment and introduces novel approaches for securing today's smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book's chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.

Managing Trust in Cyberspace (Paperback): Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Managing Trust in Cyberspace (Paperback)
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
R1,898 Discovery Miles 18 980 Ships in 10 - 15 working days

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.

The Science of Biometrics - Security Technology for Identity Verification (Hardcover): Ravindra Das The Science of Biometrics - Security Technology for Identity Verification (Hardcover)
Ravindra Das
R5,343 Discovery Miles 53 430 Ships in 10 - 15 working days

The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review. This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.

Valuing Data - An Open Framework (Hardcover): Dewey Ray Valuing Data - An Open Framework (Hardcover)
Dewey Ray
R2,569 Discovery Miles 25 690 Ships in 10 - 15 working days

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.

New Dimensions of Information Warfare (Hardcover, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Hardcover, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,259 Discovery Miles 42 590 Ships in 18 - 22 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition): William (Chuck) Easttom Network Defense and Countermeasures - Principles and Practices (Paperback, 3rd edition)
William (Chuck) Easttom
R1,991 Discovery Miles 19 910 Ships in 10 - 15 working days

All you need to know about defending networks, in one book * Clearly explains concepts, terminology, challenges, tools, and skills * Covers key security standards and models for business and government * The perfect introduction for all network/computer security professionals and students Welcome to today's most useful and practical introduction to defending modern networks. Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the concepts, terminology, techniques, and solutions you'll need to be effective. Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. You'll learn how to harden operating systems, defend against malware and network attacks, establish robust security policies, and assess network security using industry-leading standards and models. You'll also find thorough coverage of key issues such as physical security, forensics, and cyberterrorism. Throughout, Easttom blends theory and application, helping you understand both what to do and why. In every chapter, quizzes, exercises, projects, and web resources deepen your understanding and help you use what you've learned-in the classroom and in your career. Learn How To * Evaluate key network risks and dangers * Choose the right network security approach for your organization * Anticipate and counter widespread network attacks, including those based on "social engineering" * Successfully deploy and apply firewalls and intrusion detection systems * Secure network communication with virtual private networks * Protect data with cryptographic public/private key systems, digital signatures, and certificates * Defend against malware, including ransomware, Trojan horses, and spyware * Harden operating systems and keep their security up to date * Define and implement security policies that reduce risk * Explore leading security standards and models, including ISO and NIST standards * Prepare for an investigation if your network has been attacked * &nb

Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function... Engineering Secure Two-Party Computation Protocols - Design, Optimization, and Applications of Efficient Secure Function Evaluation (Paperback, 2012 ed.)
Thomas Schneider
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.

Understanding Cybersecurity Management in FinTech - Challenges, Strategies, and Trends (Hardcover, 1st ed. 2021): Gurdip Kaur,... Understanding Cybersecurity Management in FinTech - Challenges, Strategies, and Trends (Hardcover, 1st ed. 2021)
Gurdip Kaur, Ziba Habibi Lashkari, Arash Habibi Lashkari
R2,372 Discovery Miles 23 720 Ships in 10 - 15 working days

This book uncovers the idea of understanding cybersecurity management in FinTech. It commences with introducing fundamentals of FinTech and cybersecurity to readers. It emphasizes on the importance of cybersecurity for financial institutions by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in FinTech. The book helps readers understand cyber threat landscape comprising different threat categories that can exploit different types of vulnerabilties identified in FinTech. It puts forward prominent threat modelling strategies by focusing on attackers, assets, and software and addresses the challenges in managing cyber risks in FinTech. The authors discuss detailed cybersecurity policies and strategies that can be used to secure financial institutions and provide recommendations to secure financial institutions from cyber-attacks.

Security Sage's Guide to Hardening the Network Infrastructure (Paperback): Steven Andres, Brian Kenyon, Erik Pack Birkholz Security Sage's Guide to Hardening the Network Infrastructure (Paperback)
Steven Andres, Brian Kenyon, Erik Pack Birkholz
R1,825 Discovery Miles 18 250 Ships in 10 - 15 working days

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.
* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures
* It offers unique coverage of network design so administrators understand how they should design and protect their enterprises
* Helps provide real practical solutions and not just background theory

The Death of the Internet (Paperback): M. Jakobsson The Death of the Internet (Paperback)
M. Jakobsson
R1,997 Discovery Miles 19 970 Ships in 18 - 22 working days

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them.

Enterprise Identity Management - Towards an Investment Decision Support Approach (Hardcover, 2013 ed.): Denis Royer Enterprise Identity Management - Towards an Investment Decision Support Approach (Hardcover, 2013 ed.)
Denis Royer
R3,337 Discovery Miles 33 370 Ships in 10 - 15 working days

The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological level is a costly and challenging endeavor. However, for decision makers it seems difficult to fully understand the impacts and opportunities arising from the introduction of EIdMS. This book explores the relevant aspects for an ex-ante evaluation of EIdMS. Therefore it examines this domain by employing a qualitative expert interview study to better understand the nature of EIdMS, as they are situated between security and productive IT systems. To this regard, the focus is put on the general nature of EIdMS projects and the constructs being relevant for analyzing such projects in the decision support phase. Based on the derived constructs and thematic topics from the interviews, an explanatory model for EIdMS introductions is derived and iteratively improved and evaluated. Finally, a possible application use-case for the creation of adequate decision support tools is presented.

Security in Network Functions Virtualization (Hardcover): Zonghua Zhang, Ahmed Meddahi Security in Network Functions Virtualization (Hardcover)
Zonghua Zhang, Ahmed Meddahi
R2,805 R2,635 Discovery Miles 26 350 Save R170 (6%) Ships in 10 - 15 working days

The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Cybersecurity 2021
Carl Freeman Hardcover R1,039 R877 Discovery Miles 8 770
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310

 

Partners