0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (274)
  • R250 - R500 (605)
  • R500+ (5,284)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The Frugal CISO - Using Innovation and Smart Approaches to Maximize Your Security Posture (Hardcover): Kerry Ann Anderson The Frugal CISO - Using Innovation and Smart Approaches to Maximize Your Security Posture (Hardcover)
Kerry Ann Anderson
R4,609 Discovery Miles 46 090 Ships in 12 - 17 working days

If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to use to run an effective and efficient information-security management program in today's cost-cutting environment.The book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results. This strategy is designed to work across a wide variety of business sectors and economic conditions and focuses on producing long-term results through investment in people and technology.The text illustrates real-world perspectives that reflect the day-to-day issues that you face in running an enterprise's security operations. Focused on managing information security programs for long-term operational success, in terms of efficiency, effectiveness, and budgeting ability, this book will help you develop the fiscal proficiency required to navigate the budgeting process.After reading this book you will understand how to manage an information security program with a limited budget, while still maintaining an appropriate level of security controls and meeting compliance requirements. The concepts and methods identified in this book are applicable to a wide variation of teams, regardless of organizational size or budget.

Web Security - A WhiteHat Perspective (Hardcover): Hanqing Wu, Liz Zhao Web Security - A WhiteHat Perspective (Hardcover)
Hanqing Wu, Liz Zhao
R4,910 Discovery Miles 49 100 Ships in 12 - 17 working days

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive guide to web security technology and explains how companies can build a highly effective and sustainable security system. In this book, web security expert Wu Hanqing reveals how hackers work and explains why companies of different scale require different security methodologies. With in-depth analysis of the reasons behind the choices, the book covers client script security, server applications security, and Internet company security operations. It also includes coverage of browser security, cross sites script attacks, click jacking, HTML5/PHP security, injection attacks, authentication, session management, access control, web frame security, DDOS, leaks, Internet transactions security, and the security development lifecycle.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R4,599 Discovery Miles 45 990 Ships in 12 - 17 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Secure Java - For Web Application Development (Hardcover): Abhay Bhargav, B. V Kumar Secure Java - For Web Application Development (Hardcover)
Abhay Bhargav, B. V Kumar
R5,019 Discovery Miles 50 190 Ships in 12 - 17 working days

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web application development. Discussing the latest application exploits and vulnerabilities, they examine various options and protection mechanisms for securing web applications against these multifarious threats. The book is organized into four sections: Provides a clear view of the growing footprint of web applications Explores the foundations of secure web application development and the risk management process Delves into tactical web application security development with Java EE Deals extensively with security testing of web applications This complete reference includes a case study of an e-commerce company facing web application security challenges, as well as specific techniques for testing the security of web applications. Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R4,593 Discovery Miles 45 930 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R4,659 Discovery Miles 46 590 Ships in 12 - 17 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Building A Global Information Assurance Program (Hardcover): Douglas E. Campbell, Raymond J. Curts Building A Global Information Assurance Program (Hardcover)
Douglas E. Campbell, Raymond J. Curts
R4,615 Discovery Miles 46 150 Ships in 12 - 17 working days

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes System Attributes Infrastructure or Architecture Interoperability IA Tools Cognitive Hierarchies Decision Cycles Organizational Considerations Operational Concepts Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R4,884 Discovery Miles 48 840 Ships in 12 - 17 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

A Technical Guide to IPSec Virtual Private Networks (Hardcover): James S. Tiller A Technical Guide to IPSec Virtual Private Networks (Hardcover)
James S. Tiller
R4,608 Discovery Miles 46 080 Ships in 12 - 17 working days

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19-23, 2019, Revised Selected Papers (Hardcover, 1st ed. 2020)
Michael Friedewald, Melek OEnen, Eva Lievens, Stephan Krenn, Samuel Fricker
R2,530 Discovery Miles 25 300 Ships in 12 - 17 working days

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Security Manager's Guide to Disasters - Managing Through Emergencies, Violence, and Other Workplace Threats (Paperback):... Security Manager's Guide to Disasters - Managing Through Emergencies, Violence, and Other Workplace Threats (Paperback)
Anthony D. Manley
R2,135 Discovery Miles 21 350 Ships in 12 - 17 working days

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure-recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats examines the most significant emergencies that may confront the security manager and provides comprehensive guidance on how to prepare for a potential crisis, what to do in the event of one, and how to mitigate the effects. Explores the Range of Disasters That Can Jeopardize Any Organization The author discusses all types of disasters, covering a range of major occurrences that could threaten or harm any business or institutional entity. These include terrorism, industrial espionage and sabotage, workplace violence, strikes, natural disasters, fires, medical emergencies-the topics run the gamut of events that security directors, loss prevention professionals, and risk managers may confront in the course of their duties. Guidance Spans from Before an Event Occurs to Its Aftermath The book provides strategies for preventing or reducing the severity of an incident and initiating immediate and professional responses to reduce the loss of life, injuries, property damage, and liability. It also provides instruction on adequate interaction and cooperation with public safety agencies, local government, and other public and private utility services. By focusing on response, recovery, and restoration, this essential reference lays out a system for placing the business or institution back into operation as soon as possible.

Protecting Critical Infrastructures Against Cyber-Attack (Hardcover): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Hardcover)
Stephen Lukasik
R4,570 Discovery Miles 45 700 Ships in 12 - 17 working days

The threat that is posed by "cyber-warriors" is illustrated by recent incidents such as the Year 2000 "Millennium Bug". Strategies to reduce the risk that cyber-attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Get Certified - A Guide to Wireless Communication Engineering Technologies (Paperback): Syed A. Ahson, Mohammad Ilyas Get Certified - A Guide to Wireless Communication Engineering Technologies (Paperback)
Syed A. Ahson, Mohammad Ilyas
R2,056 Discovery Miles 20 560 Ships in 12 - 17 working days

The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry's growing need for communications professionals with practical problem-solving skills in real-world situations. Individuals who achieve this prestigious certification are recognized as possessing the required knowledge, skill, and abilities to meet wireless challenges in various industry, business, corporate, and organizational settings. Presenting contributions from 50 wireless communications experts from all corners of the world, Get Certified: A Guide to Wireless Communication Engineering Technologies provides an authoritative review of the seven areas of expertise covered on WCET exam. It supplies cutting-edge coverage of the broad range of topics related to wireless communications to facilitate the technical competency required to achieve certification. The text outlines industry agreements, standards, policies, and regulations including licenses and permits, health and safety, and compliance. With coverage ranging from basic concepts to research-grade material and future directions, the book provides a general overview of the evolution of wireless technologies, their impact on the profession, and common professional best practices. The book's well-structured presentation along with suggestions for further information and study, make it an indispensible guide for attaining WCET certification and a comprehensive source of reference for wireless professionals to keep pace with ever-evolving technology and standards in the field.

Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Paperback): Zoran S. Bojkovic, Bojan M.... Wireless Multimedia Communication Systems - Design, Analysis, and Implementation (Paperback)
Zoran S. Bojkovic, Bojan M. Bakmaz, K.R. Rao
R2,847 Discovery Miles 28 470 Ships in 12 - 17 working days

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids. Offering an accessible treatment of the latest research, this book: Presents specific wireless multimedia communication schemes that have proven to be useful Discusses important standardization processing activities regarding wireless networking Includes wireless mesh and multimedia sensor network architectures, protocols, and design optimizations Highlights the challenges associated with meeting complex connectivity requirements Contains numerous figures, tables, examples, references, and a glossary of acronyms Providing coverage of significant technological advances in their initial steps along with a survey of the fundamental principles and practices, Wireless Multimedia Communication Systems: Design, Analysis, and Implementation aids senior-level and graduate-level engineering students and practicing professionals in understanding the processes and furthering the development of today's wireless multimedia communication systems.

Advances in Biometrics for Secure Human Authentication and Recognition (Paperback): Dakshina Ranjan Kisku, Phalguni Gupta,... Advances in Biometrics for Secure Human Authentication and Recognition (Paperback)
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
R1,567 Discovery Miles 15 670 Ships in 12 - 17 working days

Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human authentication and recognition. Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional techniques as well as novel systems that have been developed over the past few years. It presents new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Filled with comprehensive graphical and modular illustrations, the text covers applications of affective computing in biometrics, matching sketch to photograph, cryptography approaches in biometrics, biometrics alteration, heterogeneous biometrics, and age invariant biometrics. It also presents biometrics algorithms with novel feature extraction techniques, computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. Containing the work of some of the world's most respected biometrics researchers, the book includes model question papers, mathematical notations, and exercises to reinforce understanding. Providing an up-to-date review of intelligence techniques and theories used in biometric technologies for secure human authentication and identification, this is an essential reference for researchers, scholars, graduate students, engineers, practitioners, and developers in the field of biometrics and its related fields.

Women Securing the Future with TIPPSS for IoT - Trust, Identity, Privacy, Protection, Safety, Security for the Internet of... Women Securing the Future with TIPPSS for IoT - Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things (Hardcover, 1st ed. 2019)
Florence D. Hudson
R3,515 Discovery Miles 35 150 Ships in 10 - 15 working days

This book provides insight and expert advice on the challenges of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for the growing Internet of Things (IoT) in our connected world. Contributors cover physical, legal, financial and reputational risk in connected products and services for citizens and institutions including industry, academia, scientific research, healthcare and smart cities. As an important part of the Women in Science and Engineering book series, the work highlights the contribution of women leaders in TIPPSS for IoT, inspiring women and men, girls and boys to enter and apply themselves to secure our future in an increasingly connected world. The book features contributions from prominent female engineers, scientists, business and technology leaders, policy and legal experts in IoT from academia, industry and government. Provides insight into women's contributions to the field of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for IoT Presents information from academia, research, government and industry into advances, applications, and threats to the growing field of cybersecurity and IoT Includes topics such as hacking of IoT devices and systems including healthcare devices, identity and access management, the issues of privacy and your civil rights, and more

Microsoft Azure Security Infrastructure (Paperback): Yuri Diogenes, Tom Shinder, Debra Shinder Microsoft Azure Security Infrastructure (Paperback)
Yuri Diogenes, Tom Shinder, Debra Shinder
R1,129 Discovery Miles 11 290 Ships in 12 - 17 working days

Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: * Understand cloud security boundaries and responsibilities * Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection * Explore Azure's defense-in-depth security architecture * Use Azure network security patterns and best practices * Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security * Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines * Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information * Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite * Effectively model threats and plan protection for IoT systems * Use Azure security tools for operations, incident response, and forensic investigation

Circuits and Systems for Security and Privacy (Hardcover): Farhana Sheikh, Leonel Sousa Circuits and Systems for Security and Privacy (Hardcover)
Farhana Sheikh, Leonel Sousa
R5,020 Discovery Miles 50 200 Ships in 12 - 17 working days

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.

Chinese Cybersecurity and Cyberdefense (Hardcover): D Ventre Chinese Cybersecurity and Cyberdefense (Hardcover)
D Ventre
R3,722 Discovery Miles 37 220 Ships in 12 - 17 working days

Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the "Chinese threat." It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension: Is Cyberspace changing the scene of international relations? How China does apprehend cybersecurity and cyberdefense? What are the issues, challenges? What is the role of China in the global cyberspace?

Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback): Ilker OEzcelik, Richard Brooks Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback)
Ilker OEzcelik, Richard Brooks
R1,881 Discovery Miles 18 810 Ships in 12 - 17 working days

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Honeypots and Routers - Collecting Internet Attacks (Hardcover): Mohssen Mohammed, Habib ur Rehman Honeypots and Routers - Collecting Internet Attacks (Hardcover)
Mohssen Mohammed, Habib ur Rehman
R1,754 Discovery Miles 17 540 Ships in 12 - 17 working days

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

The Perfect Weapon - War, Sabotage, and Fear in the Cyber Age (Paperback): David Sanger The Perfect Weapon - War, Sabotage, and Fear in the Cyber Age (Paperback)
David Sanger 1
R462 R374 Discovery Miles 3 740 Save R88 (19%) Ships in 12 - 17 working days

From Russia’s tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists.

Cheap to acquire, easily deniable, and used for a variety of malicious purposes ― from crippling infrastructure to sowing discord and doubt ― cyberweapons are re-writing the rules of warfare. In less than a decade, they have displaced terrorism and nuclear missiles as the biggest immediate threat to international security and to democracy.

Here, New York Times correspondent David E. Sanger takes us from the White House Situation Room to the dens of Chinese government hackers and the boardrooms of Silicon Valley, piecing together a remarkable picture of a world now coming face-to-face with the most sophisticated ― and arguably most dangerous ― weapon ever invented.

The Perfect Weapon is the dramatic story of a new era of constant sabotage, misinformation, and fear, in which everyone is a target.

Cyber Threats and Nuclear Weapons (Paperback): Herbert Lin Cyber Threats and Nuclear Weapons (Paperback)
Herbert Lin
R571 Discovery Miles 5 710 Ships in 12 - 17 working days

The technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before. This book is the first to confront these risks comprehensively. With Cyber Threats and Nuclear Weapons, Herbert Lin provides a clear-eyed breakdown of the cyber risks to the U.S. nuclear enterprise. Featuring a series of scenarios that clarify the intersection of cyber and nuclear risk, this book guides readers through a little-understood element of the risk profile that government decision-makers should be anticipating. What might have happened if the Cuban Missile Crisis took place in the age of Twitter, with unvetted information swirling around? What if an adversary announced that malware had compromised nuclear systems, clouding the confidence of nuclear decision-makers? Cyber Threats and Nuclear Weapons, the first book to consider cyber risks across the entire nuclear enterprise, concludes with crucial advice on how government can manage the tensions between new nuclear capabilities and increasing cyber risk. This is an invaluable handbook for those ready to confront the unique challenges of cyber nuclear risk.

Cybersecurity for Business - Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue (Hardcover): Larry... Cybersecurity for Business - Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue (Hardcover)
Larry Clinton
R2,633 Discovery Miles 26 330 Ships in 12 - 17 working days

Balance the benefits of digital transformation with the associated risks with this guide to effectively managing cybersecurity as a strategic business issue. Important and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate reputation and consumer confidence. Over the past several years, organizations around the world have increasingly come to appreciate the need to address cybersecurity issues from a business perspective, not just from a technical or risk angle. Cybersecurity for Business builds on a set of principles developed with international leaders from technology, government and the boardroom to lay out a clear roadmap of how to meet goals without creating undue cyber risk. This essential guide outlines the true nature of modern cyber risk, and how it can be assessed and managed using modern analytical tools to put cybersecurity in business terms. It then describes the roles and responsibilities each part of the organization has in implementing an effective enterprise-wide cyber risk management program, covering critical issues such as incident response, supply chain management and creating a culture of security. Bringing together a range of experts and senior leaders, this edited collection enables leaders and students to understand how to manage digital transformation and cybersecurity from a business perspective.

Cybersecurity Essentials (Paperback): C.J. Brooks Cybersecurity Essentials (Paperback)
C.J. Brooks
R1,078 R759 Discovery Miles 7 590 Save R319 (30%) Ships in 12 - 17 working days

An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. * Learn security and surveillance fundamentals * Secure and protect remote access and devices * Understand network topologies, protocols, and strategies * Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,949 R6,257 Discovery Miles 62 570
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,284 Discovery Miles 82 840
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R854 Discovery Miles 8 540
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,042 R856 Discovery Miles 8 560
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560

 

Partners