0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,154)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Intrusion Detection in Wireless Ad-Hoc Networks (Hardcover, New): Nabendu Chaki, Rituparna Chaki Intrusion Detection in Wireless Ad-Hoc Networks (Hardcover, New)
Nabendu Chaki, Rituparna Chaki
R2,893 Discovery Miles 28 930 Ships in 10 - 15 working days

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems. Addresses architecture and organization issues Examines the different types of routing attacks for WANs Explains how to ensure Quality of Service in secure routing Considers honesty and trust-based IDS solutions Explores emerging trends in WAN security Describes the blackhole attack detection technique Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.

Emerging Trends in ICT Security (Hardcover): Babak Akhgar, Hamid R Arabnia Emerging Trends in ICT Security (Hardcover)
Babak Akhgar, Hamid R Arabnia
R2,390 Discovery Miles 23 900 Ships in 10 - 15 working days

"Emerging Trends in ICT Security, " an edited volume, discusses the foundations and theoretical aspects of ICT security; coverstrends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider s look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing.
Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructuresDiscusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacksAddresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing"

Effective Surveillance for Homeland Security - Balancing Technology and Social Issues (Hardcover, New): Francesco Flammini,... Effective Surveillance for Homeland Security - Balancing Technology and Social Issues (Hardcover, New)
Francesco Flammini, Roberto Setola, Giorgio Franceschetti
R4,271 Discovery Miles 42 710 Ships in 10 - 15 working days

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologies that are part of a framework whose aim is to move from a simple collection and storage of information toward proactive systems that are able to fuse several information sources to detect relevant events in their early incipient phase. Part III, Technologies for Homeland Security, considers relevant applications of surveillance systems in the framework of homeland security. It presents real-world case studies of how innovative technologies can be used to effectively improve the security of sensitive areas without violating the rights of the people involved. Examining cutting-edge research topics, the book provides you with a comprehensive understanding of the technological, legislative, organizational, and management issues related to surveillance. With a specific focus on privacy, it presents innovative solutions to many of the issues that remain in the quest to balance security with the preservation of privacy that society demands.

Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover): Frank Siepmann Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover)
Frank Siepmann
R1,875 Discovery Miles 18 750 Ships in 10 - 15 working days

With cloud computing quickly becoming a standard in today s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments requiring a change in how we evaluate risk and protect information, processes, and people.
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization.
Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization.
Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics.
By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.

Securing Social Networks in Cyberspace (Hardcover): Al-Sakib Khan Pathan Securing Social Networks in Cyberspace (Hardcover)
Al-Sakib Khan Pathan
R2,674 Discovery Miles 26 740 Ships in 10 - 15 working days

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New):... The Center for Democracy and Technology and Internet Privacy in the U.S. - Lessons of the First Five Years (Hardcover, New)
Joyce H.-S. Li
R2,564 Discovery Miles 25 640 Ships in 10 - 15 working days

The Internet has become a necessary component of our personal and professional lives, but because the Internet has redefined the boundaries of communication, it has also put our confidential information at risk. The growing concern with online privacy has caused many Internet users to question the security of their Internet transactions. This book answers these questions through an examination of the Center for Democracy and Technology, an organization that advocates for privacy. Li's book introduces the many issues in online privacy and discusses legal ownership of personal data, specifically one's name, address, telephone number, and email. Her in-depth research of the issues confronted by the Center for Democracy and Technology over a five-year period documents its mission and demonstrates its achievements in the crusade to maintain privacy. As we find ourselves using the Internet for more and more transactions, both personal and professional, we must be aware of our privacy rights and the activities of the organizations that fight to protect them-thus, the information in Li's book makes it a necessary reference for all public and university libraries and a useful resource for courses in information technology. Internet Privacy serves as an introduction to the issues of online privacy in the United States and examines what one advocacy group is doing to protect privacy in cyberspace.

Information Security Management Handbook, Volume 7 (Hardcover, 6th edition): Richard O'Hanley, James S. Tiller Information Security Management Handbook, Volume 7 (Hardcover, 6th edition)
Richard O'Hanley, James S. Tiller
R4,243 Discovery Miles 42 430 Ships in 10 - 15 working days

Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals Updates its bestselling predecessors with new developments in information security and the (ISC)2 (R) CISSP (R) CBK (R) Provides valuable insights from leaders in the field on the theory and practice of computer security technology Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

Risk Management Framework - A Lab-Based Approach to Securing Information Systems (Paperback, New): James Broad Risk Management Framework - A Lab-Based Approach to Securing Information Systems (Paperback, New)
James Broad
R1,272 Discovery Miles 12 720 Ships in 10 - 15 working days

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly implement this process. No other publication covers this topic in the detail provided in this book or provides hands-on exercises that will enforce the topics. Examples in the book follow a fictitious organization through the RMF, allowing the reader to follow the development of proper compliance measures. Templates provided in the book allow readers to quickly implement the RMF in their organization. The need for this book continues to expand as government and non-governmental organizations build their security programs around the RMF. The companion website provides access to all of the documents, templates and examples needed to not only understand the RMF but also implement this process in the reader s own organization.

A comprehensive case study from initiation to decommission and disposal

Detailed explanations of the complete RMF process and its linkage to the SDLC

Hands on exercises to reinforce topics

Complete linkage of the RMF to all applicable laws, regulations and publications as never seen before "

Cyber-Physical Systems - Integrated Computing and Engineering Design (Hardcover, New): Fei Hu Cyber-Physical Systems - Integrated Computing and Engineering Design (Hardcover, New)
Fei Hu
R3,956 Discovery Miles 39 560 Ships in 10 - 15 working days

Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physical objects, it is believed CPSs will transform how we interact with the physical world, just like the Internet transformed how we interact with one another. A CPS could be a system at multiple scales, from large smart bridges with fluctuation detection and responding functions, to autonomous cars and tiny implanted medical devices. Cyber-Physical Systems: Integrated Computing and Engineering Design supplies comprehensive coverage of the principles and design of CPSs. It addresses the many challenges that must be overcome and outlines a roadmap of how to get there. Emphasizes the integration of cyber computing and physical objects control Covers important CPS theory foundations and models Includes interesting case studies of several important civilian and health care applications that illustrate the CPS design process Addresses the collaboration of the sensing and controlling of a physical system with robust software architecture Explains how to account for random failure events that can occur in a real CPS environment Presented in a systematic manner, the book begins by discussing the basic concept underlying CPSs and examining some challenging design issues. It then covers the most important design theories and modeling methods for a practical CPS. Next, it moves on to sensor-based CPSs, which use embedded sensors and actuators to interact with the physical world. The text presents concrete CPS designs for popular civilian applications, including building and energy management. Reflecting the importance of human health care in society, it includes CPS examples of rehabilitation applications such as virtual reality-based disability recovery platforms.

CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition): Daniel Carter CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition)
Daniel Carter
R957 Discovery Miles 9 570 Ships in 10 - 15 working days

This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP exam Thoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge. The book offers clear explanations of every subject on the CCSP exam and features accurate practice questions and real-world examples. New, updated, or expanded coverage includes cloud data security, DevOps security, mobile computing, threat modeling paradigms, regulatory and legal frameworks, and best practices and standards. Written by a respected computer security expert, CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition is both a powerful study tool and a valuable reference that will serve professionals long after the test. To aid in self-study, each chapter includes exam tips that highlight key information, a summary that serves as a quick review of salient points, and practice questions that allow you to test your comprehension. Special design elements throughout provide insight and call out potentially harmful situations. All practice questions match the tone, content, and format of those on the actual exam Includes access to 300 practice questions in the TotalTester (TM) Online customizable test engine Written by an IT security expert and experienced author

Iris Biometric Model for Secured Network Access (Hardcover): Franjieh El Khoury Iris Biometric Model for Secured Network Access (Hardcover)
Franjieh El Khoury
R4,214 Discovery Miles 42 140 Ships in 10 - 15 working days

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development of new methods in biometric authentication in order to provide greater efficiency in the ICAS model. It also covers the pretopological aspects in the development of the indexed hierarchy to classify DRVA iris templates. The book introduces biometric systems, cryptography, and multi-agent systems (MAS) and explains how they can be used to solve security problems in complex systems. Examining the growing interest to exploit MAS across a range of fields through the integration of various features of agents, it also explains how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access. The book presents the various conventional methods for the localization of external and internal edges of the iris of the eye based on five simulations and details the effectiveness of each. It also improves upon existing methods for the localization of the external and internal edges of the iris and for removing the intrusive effects of the eyelids.

Conflict and Cooperation in Cyberspace - The Challenge to National Security (Hardcover, New): Panayotis A Yannakogeorgos, Adam... Conflict and Cooperation in Cyberspace - The Challenge to National Security (Hardcover, New)
Panayotis A Yannakogeorgos, Adam B Lowther
R3,235 Discovery Miles 32 350 Ships in 10 - 15 working days

Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, it offers a well-reasoned study of how to prepare for war, while attempting to keep the peace in the cyberspace domain. The discussion begins with thoughtful contributions concerning the attributes and importance of cyberspace to the American way of life and global prosperity. Examining the truths and myths behind recent headline-grabbing malicious cyber activity, the book spells out the challenges involved with establishing a robust system of monitoring, controls, and sanctions to ensure cooperation amongst all stakeholders. The desire is to create a domain that functions as a trusted and resilient environment that fosters cooperation, collaboration, and commerce. Additionally, the book: Delves into the intricacies and considerations cyber strategists must contemplate before engaging in cyber war Offers a framework for determining the best ways to engage other nations in promoting global norms of behavior Illustrates technologies that can enable cyber arms control agreements Dispels myths surrounding Stuxnet and industrial control systems General Michael V. Hayden, former director of the National Security Agency and the Central Intelligence Agency, begins by explaining why the policymakers, particularly those working on cyber issues, must come to understand the policy implications of a dynamic domain. Expert contributors from the Air Force Research Institute, MIT, the Rand Corporation, Naval Postgraduate School, NSA, USAF, USMC, and others examine the challenges involved with ensuring improved cyber security. Outlining the larger ethical, legal, and policy challenges facing government, the private sector, civil society, and individual users, the book offers plausible solutions on how to create an environment where there is confidence in the ability to assure national security, conduct military operations, and ensure a vibrant and stable global economy.

Introduction to Cyber-Warfare - A Multidisciplinary Approach (Paperback): Paulo Shakarian, Jana Shakarian, Andrew Ruef Introduction to Cyber-Warfare - A Multidisciplinary Approach (Paperback)
Paulo Shakarian, Jana Shakarian, Andrew Ruef
R1,040 Discovery Miles 10 400 Ships in 10 - 15 working days

"Introduction to Cyber-Warfare: A Multidisciplinary Approach, "written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.
Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in playPresents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah, ) and cyber-attack as a tool against dissidents within a state (Russia, Iran)Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle, 3rd Edition (Paperback, 3rd... CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle, 3rd Edition (Paperback, 3rd Edition)
M. Chapple
R1,602 Discovery Miles 16 020 Ships in 10 - 15 working days

This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide, 3rd Edition with an updated collection of practice questions and practice exams in CCSP (ISC)2 Certified Cloud Security Professional Official Practice Tests, 3rd Edition to give you the best preparation ever for the high-stakes (ISC)2 CCSP exam. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with Sybex study tools that include pre-test assessments that show you what you know, and areas you need to further review. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete, online practice exams. Covering all domains tested by the CCSP exam, this book walks you through Architectural Concepts and Design Requirements, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Operations, and Legal and Compliance with real-world scenarios to help you apply your skills along the way. Along with the book, you also get access to Sybex's stellar online interactive learning environment that includes two unique practice exams to help you identify where you need to study more, electronic flashcards to reinforce your learning and give you last-minute test prep before the exam, and a searchable glossary in PDF format to give you instant access to the key terms you need to know for the exam. Add to that the thoroughly updated (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 3rd Edition, with two more complete exams and at least another 60 questions for each of the six domains and you'll be ready to succeed on the challenging CCSP exam.

Random Dynamical Systems in Finance (Hardcover, New): Anatoliy Swishchuk, Shafiqul Islam Random Dynamical Systems in Finance (Hardcover, New)
Anatoliy Swishchuk, Shafiqul Islam
R4,221 Discovery Miles 42 210 Ships in 10 - 15 working days

The theory and applications of random dynamical systems (RDS) are at the cutting edge of research in mathematics and economics, particularly in modeling the long-run evolution of economic systems subject to exogenous random shocks. Despite this interest, there are no books available that solely focus on RDS in finance and economics. Exploring this emerging area, Random Dynamical Systems in Finance shows how to model RDS in financial applications.

Through numerous examples, the book explains how the theory of RDS can describe the asymptotic and qualitative behavior of systems of random and stochastic differential/difference equations in terms of stability, invariant manifolds, and attractors. The authors present many models of RDS and develop techniques for implementing RDS as approximations to financial models and option pricing formulas. For example, they approximate geometric Markov renewal processes in ergodic, merged, double-averaged, diffusion, normal deviation, and Poisson cases and apply the obtained results to option pricing formulas.

With references at the end of each chapter, this book provides a variety of RDS for approximating financial models, presents numerous option pricing formulas for these models, and studies the stability and optimal control of RDS. The book is useful for researchers, academics, and graduate students in RDS and mathematical finance as well as practitioners working in the financial industry.

Malware Forensics Field Guide for Windows Systems - Digital Forensics Field Guides (Paperback, New): Cameron H. Malin, Eoghan... Malware Forensics Field Guide for Windows Systems - Digital Forensics Field Guides (Paperback, New)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R1,328 R1,227 Discovery Miles 12 270 Save R101 (8%) Ships in 10 - 15 working days

Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Hardcover)
Mark Tarallo
R1,816 Discovery Miles 18 160 Ships in 10 - 15 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

Innovations in Computer Science and Engineering - Proceedings of the Fourth ICICSE 2016 (Hardcover, 1st ed. 2017): H.S. Saini,... Innovations in Computer Science and Engineering - Proceedings of the Fourth ICICSE 2016 (Hardcover, 1st ed. 2017)
H.S. Saini, Rishi Sayal, Sandeep Singh Rawat
R8,666 Discovery Miles 86 660 Ships in 10 - 15 working days

The book is a collection of high-quality peer-reviewed research papers presented at the Fourth International Conference on Innovations in Computer Science and Engineering (ICICSE 2016) held at Guru Nanak Institutions, Hyderabad, India during 22 - 23 July 2016. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academic and industry present their original work and exchange ideas, information, techniques and applications in the field of data science and analytics, artificial intelligence and expert systems, mobility, cloud computing, network security, and emerging technologies.

Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Hardcover, New): S. Caroline Taylor, Daniel... Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Hardcover, New)
S. Caroline Taylor, Daniel Joseph Torpy, Dilip K Das
R3,235 Discovery Miles 32 350 Ships in 10 - 15 working days

The movement of humans across borders is increasing exponentially-some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling. Consequently, the policing of human movement within and across borders has been and remains a significant concern to nations. Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism explores the nature of these challenges for police, governments, and citizens at large.

Drawn from keynote and paper presentations at a recent International Police Executive Symposium meeting in Malta, the book presents the work of scholars and practitioners who analyze a variety of topics on the cutting edge of global policing, including:

  • Western attempts to reform the policing of sex tourists in the Philippines and Gambia
  • Policing the flow of people and goods in the port of Rotterdam
  • Policing protestors and what happened at the 2010 G20 Summit in Toronto
  • Mexico's use of the military in its war against drug trafficking
  • Public-private cooperation in the fight against organized crime and terrorism in Australia
  • Recommendations for police reform in Afghanistan
  • Sweden's national counterterrorism unit
  • Treatment of asylum seekers in a privately run detention center in South Africa
  • The policing of human trafficking for the sex trade in sub-Saharan Africa, Vietnam, Australia, and Andhra Pradesh, India

Examining areas of increasing concern to governments and citizens around the world, this timely volume presents critical international perspectives on these ongoing global challenges that threaten the safety of humans worldwide.

Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New): Gilbert N. Sorebo, Michael C.... Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New)
Gilbert N. Sorebo, Michael C. Echols
R4,229 Discovery Miles 42 290 Ships in 10 - 15 working days

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid. Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security ExaminersFollowing an overview of the components of the Smart Grid, the book delves into the evolution of security standards and regulations and examines ways in which the Smart Grid might be regulated. The authors discuss the technical details about how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission-the foundation for the delivery of electricity, along with distributed generation, micro-grids, and operations. The book explores future concepts-such as energy storage and the use of plug-in electric vehicles (PEVs)-in addition to the concomitant risk for fraud and manipulation with stored energy. Consumer-related issues are discussed as they pertain to emerging ways of receiving and generating energy. The book examines dysfunctions ranging from inadvertent outages to cyber-attack and presents recommendations on how to respond to these incidents. It concludes with speculation of future cyber-security challenges and discusses new ways that the grid can be defended, such as better key management and protection. Written in a style rigorous enough for the practitioner yet accessible to a broad audience, this comprehensive volume covers a topic that is becoming more critical to industry and consumers everywhere.

Trends and Future Directions in Security and Emergency Management (Hardcover, 1st ed. 2022): Irena Tuser, Sarka Hoskova-Mayerova Trends and Future Directions in Security and Emergency Management (Hardcover, 1st ed. 2022)
Irena Tuser, Sarka Hoskova-Mayerova
R4,751 Discovery Miles 47 510 Ships in 18 - 22 working days

This book aims to inform about the current empirical results of the work of experts in the field security and emergency management and risk management in connecting science, theory and practice in various fields related to security management and emergency management. The chapters present research work and case studies from international, state as well as regional levels. The book is divided into five sections, which deal with Safety and Security Science, Security and Emergency managment, Threats and Risks, Cyber Risks and Extraordinary Event, Preparation and Solutions. The book is intended primarily for scientific communities established in security sciences, theorists and experts working in various positions and levels of security organizations, universities with specializations in security studies, but also for the expert public interested in security issues or entities directly responsible for security and emergency management.

The 7 Qualities of Highly Secure Software (Hardcover): Mano Paul The 7 Qualities of Highly Secure Software (Hardcover)
Mano Paul
R1,864 Discovery Miles 18 640 Ships in 10 - 15 working days

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book: Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations Specifies the qualities and skills that are essential for building secure software Highlights the parallels between the habits of effective people and qualities in terms of software security Praise for the Book: This will be required reading for my executives, security team, software architects and lead developers.-David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.-Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.-Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas

100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback): Nick Vandome 100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback)
Nick Vandome
R164 Discovery Miles 1 640 Ships in 10 - 15 working days
Security in Embedded Devices (Hardcover, 2010 ed.): Catherine H. Gebotys Security in Embedded Devices (Hardcover, 2010 ed.)
Catherine H. Gebotys
R4,175 Discovery Miles 41 750 Ships in 18 - 22 working days

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

International Conference on Communication, Computing and Electronics Systems - Proceedings of ICCCES 2020 (Hardcover, 1st ed.... International Conference on Communication, Computing and Electronics Systems - Proceedings of ICCCES 2020 (Hardcover, 1st ed. 2021)
V. Bindhu, Joao Manuel R.S. Tavares, Alexandros-Apostolos A. Boulogeorgos, Chandrasekar Vuppalapati
R7,132 Discovery Miles 71 320 Ships in 18 - 22 working days

This book includes high-quality papers presented at the International Conference on Communication, Computing and Electronics Systems 2020, held at the PPG Institute of Technology, Coimbatore, India, on 21-22 October 2020. The book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Cybersecurity Crisis Management and…
Ryma Abassi, Aida Ben Chehida Douss Hardcover R5,931 Discovery Miles 59 310
The Cybersecurity Mindset - A Virtual…
Dewayne Hart Hardcover R742 Discovery Miles 7 420
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300

 

Partners