0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (272)
  • R250 - R500 (605)
  • R500+ (5,289)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Cyber Threats and Nuclear Weapons (Paperback): Herbert Lin Cyber Threats and Nuclear Weapons (Paperback)
Herbert Lin
R571 Discovery Miles 5 710 Ships in 12 - 17 working days

The technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before. This book is the first to confront these risks comprehensively. With Cyber Threats and Nuclear Weapons, Herbert Lin provides a clear-eyed breakdown of the cyber risks to the U.S. nuclear enterprise. Featuring a series of scenarios that clarify the intersection of cyber and nuclear risk, this book guides readers through a little-understood element of the risk profile that government decision-makers should be anticipating. What might have happened if the Cuban Missile Crisis took place in the age of Twitter, with unvetted information swirling around? What if an adversary announced that malware had compromised nuclear systems, clouding the confidence of nuclear decision-makers? Cyber Threats and Nuclear Weapons, the first book to consider cyber risks across the entire nuclear enterprise, concludes with crucial advice on how government can manage the tensions between new nuclear capabilities and increasing cyber risk. This is an invaluable handbook for those ready to confront the unique challenges of cyber nuclear risk.

Cybersecurity Essentials (Paperback): C.J. Brooks Cybersecurity Essentials (Paperback)
C.J. Brooks
R1,078 R759 Discovery Miles 7 590 Save R319 (30%) Ships in 12 - 17 working days

An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm. This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios. Each part concludes with a summary of key concepts, review questions, and hands-on exercises, allowing you to test your understanding while exercising your new critical skills. Cybersecurity jobs range from basic configuration to advanced systems analysis and defense assessment. This book provides the foundational information you need to understand the basics of the field, identify your place within it, and start down the security certification path. * Learn security and surveillance fundamentals * Secure and protect remote access and devices * Understand network topologies, protocols, and strategies * Identify threats and mount an effective defense Cybersecurity Essentials gives you the building blocks for an entry level security certification and provides a foundation of cybersecurity knowledge

Multilevel Modeling of Secure Systems in QoP-ML (Hardcover): Bogdan Ksiezopolski Multilevel Modeling of Secure Systems in QoP-ML (Hardcover)
Bogdan Ksiezopolski
R2,482 Discovery Miles 24 820 Ships in 12 - 17 working days

In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Supplies a multilevel analysis of Cloud-based data centers Details the structures for advanced communication modeling and energy analysis Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures Includes case studies that illustrate the QoP analysis process using the QoP-ML Examines the robust security metrics of cryptographic primitives Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system's security.

Container Security - Fundamental Technology Concepts that Protect Containerized Applications (Paperback): Liz Rice Container Security - Fundamental Technology Concepts that Protect Containerized Applications (Paperback)
Liz Rice
R898 Discovery Miles 8 980 Ships in 12 - 17 working days

To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions. Author Liz Rice, VP of open source engineering at Aqua Security, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you're ready to get started. Explore attack vectors that affect container deployments Dive into the Linux constructs that underpin containers Examine measures for hardening containers Understand how misconfigurations can compromise container isolation Learn best practices for building container images Identify container images that have known software vulnerabilities Leverage secure connections between containers Use security tooling to prevent attacks on your deployment

Cybersecurity for Business - Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue (Hardcover): Larry... Cybersecurity for Business - Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue (Hardcover)
Larry Clinton
R2,633 Discovery Miles 26 330 Ships in 12 - 17 working days

Balance the benefits of digital transformation with the associated risks with this guide to effectively managing cybersecurity as a strategic business issue. Important and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate reputation and consumer confidence. Over the past several years, organizations around the world have increasingly come to appreciate the need to address cybersecurity issues from a business perspective, not just from a technical or risk angle. Cybersecurity for Business builds on a set of principles developed with international leaders from technology, government and the boardroom to lay out a clear roadmap of how to meet goals without creating undue cyber risk. This essential guide outlines the true nature of modern cyber risk, and how it can be assessed and managed using modern analytical tools to put cybersecurity in business terms. It then describes the roles and responsibilities each part of the organization has in implementing an effective enterprise-wide cyber risk management program, covering critical issues such as incident response, supply chain management and creating a culture of security. Bringing together a range of experts and senior leaders, this edited collection enables leaders and students to understand how to manage digital transformation and cybersecurity from a business perspective.

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R3,606 Discovery Miles 36 060 Ships in 12 - 17 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Secure Data Provenance and Inference Control with Semantic Web (Hardcover): Bhavani Thuraisingham, Tyrone Cadenhead, Murat... Secure Data Provenance and Inference Control with Semantic Web (Hardcover)
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
R3,484 Discovery Miles 34 840 Ships in 12 - 17 working days

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.

We Have Root - Even More Advice from Schneier on Security (Paperback): B. Schneier We Have Root - Even More Advice from Schneier on Security (Paperback)
B. Schneier
R482 R365 Discovery Miles 3 650 Save R117 (24%) Ships in 12 - 17 working days

A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments. Bruce's writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and many others. And now you can enjoy his essays in one place--at your own speed and convenience. Timely security and privacy topics The impact of security and privacy on our world Perfect for fans of Bruce's blog and newsletter Lower price than his previous essay collections The essays are written for anyone who cares about the future and implications of security and privacy for society.

Exploring Malicious Hacker Communities - Toward Proactive Cyber-Defense (Hardcover): Ericsson Marin, Mohammed Almukaynizi,... Exploring Malicious Hacker Communities - Toward Proactive Cyber-Defense (Hardcover)
Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, …
R1,701 R1,542 Discovery Miles 15 420 Save R159 (9%) Ships in 12 - 17 working days

Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology - a hybridization of machine learning, artificial intelligence, and social network analysis methods - and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems.

Security for Multihop Wireless Networks (Hardcover): Shafiullah Khan, Jaime Lloret Mauri Security for Multihop Wireless Networks (Hardcover)
Shafiullah Khan, Jaime Lloret Mauri
R3,511 Discovery Miles 35 110 Ships in 12 - 17 working days

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.

Ciberseguridad - Una Simple Guia para Principiantes sobre Ciberseguridad, Redes Informaticas y Como Protegerse del Hacking en... Ciberseguridad - Una Simple Guia para Principiantes sobre Ciberseguridad, Redes Informaticas y Como Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingenieria Social (Spanish, Hardcover)
Quinn Kiser
R727 R607 Discovery Miles 6 070 Save R120 (17%) Ships in 10 - 15 working days
Security as Code - DevSecOps Patterns with AWS (Paperback): BK Sarthak Das, Virginia Chu Security as Code - DevSecOps Patterns with AWS (Paperback)
BK Sarthak Das, Virginia Chu
R901 Discovery Miles 9 010 Ships in 12 - 17 working days

DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code. In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code, you'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers. This practical book also provides common patterns and methods to securely develop infrastructure for resilient and highly available backups that you can restore with just minimal manual intervention. Learn the tools of the trade, using Kubernetes and the AWS Code Suite Set up infrastructure as code and run scans to detect misconfigured resources in your code Create secure logging patterns with CloudWatch and other tools Restrict system access to authorized users with role-based access control (RBAC) Inject faults to test the resiliency of your application with AWS Fault Injector or open source tooling Learn how to pull everything together into one deployment

Building Machine Learning Pipelines (Paperback): Hannes Hapke Building Machine Learning Pipelines (Paperback)
Hannes Hapke; Contributions by Catherine Nelson
R1,257 Discovery Miles 12 570 Ships in 12 - 17 working days

Companies are spending billions on machine learning projects, but it's money wasted if the models can't be deployed effectively. In this practical guide, Hannes Hapke and Catherine Nelson walk you through the steps of automating a machine learning pipeline using the TensorFlow ecosystem. You'll learn the techniques and tools that will cut deployment time from days to minutes, so that you can focus on developing new models rather than maintaining legacy systems. Data scientists, machine learning engineers, and DevOps engineers will discover how to go beyond model development to successfully productize their data science projects, while managers will better understand the role they play in helping to accelerate these projects. Understand the steps to build a machine learning pipeline Build your pipeline using components from TensorFlow Extended Orchestrate your machine learning pipeline with Apache Beam, Apache Airflow, and Kubeflow Pipelines Work with data using TensorFlow Data Validation and TensorFlow Transform Analyze a model in detail using TensorFlow Model Analysis Examine fairness and bias in your model performance Deploy models with TensorFlow Serving or TensorFlow Lite for mobile devices Learn privacy-preserving machine learning techniques

CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002) (Paperback, 2nd edition): Heather Linn,... CompTIA PenTest+ Certification All-in-One Exam Guide, Second Edition (Exam PT0-002) (Paperback, 2nd edition)
Heather Linn, Raymond Nutting
R948 Discovery Miles 9 480 Ships in 12 - 17 working days

This fully-updated guide delivers complete coverage of every topic on the current version of the CompTIA PenTest+ certification exam. Take the latest version of the CompTIA PenTest+ certification exam (exam PT0-002) with complete confidence using the hands-on information contained in this up-to-date self-study resource. Readers will get clear instruction and real-world examples from a pair of seasoned computer security experts along with hundreds of accurate practice questions. CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002) features exam tips, step-by-step exercises, chapter summaries, and end of chapter practice questions. Special design elements throughout provide real-world insight and call out potentially harmful situations. Fulfilling the promise of the All-in-One series, this comprehensive reference serves both as a study tool AND a valuable on-the-job reference that will serve readers well beyond the exam. Provides 100% coverage of all exam objectives for the current CompTIA PenTest+ certification exam Includes online access to 200+ practice questions in the TotalTester exam engine Contains a 10% off exam voucher coupon, approximately a $37 value

Strategic and Practical Approaches for Information Security Governance - Technologies and Applied Solutions (Hardcover, New):... Strategic and Practical Approaches for Information Security Governance - Technologies and Applied Solutions (Hardcover, New)
Manish Gupta, John Walp, Raj Sharman
R5,163 Discovery Miles 51 630 Ships in 12 - 17 working days

Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the book is to provide an organization with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors. The book aims to be a collection of knowledge for professionals, scholars, researchers and academicians working in this field that is fast evolving and growing as an area of information assurance.

Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017): Richard Jiang,... Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017)
Richard Jiang, Somaya Al-Maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi
R5,061 R4,807 Discovery Miles 48 070 Save R254 (5%) Ships in 12 - 17 working days

This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.

Proceedings of the 3rd European Conference on Computer Network Defense (Hardcover, 2009 ed.): Vasilios Siris, Sotiris... Proceedings of the 3rd European Conference on Computer Network Defense (Hardcover, 2009 ed.)
Vasilios Siris, Sotiris Ioannidis, Kostas Anagnostakis, Panagiotis Trimintzios
R4,228 Discovery Miles 42 280 Ships in 10 - 15 working days

The European Conference on Computer and Network Defense draws contributions and participation both from academia and industry, and addresses security from multiple perspectives, including state-of-the-art research in computer network security, intrusion detection, denial-of-service, privacy protection, security policies, and incident response & management. The conference is organized jointly by the Institute of Computer Science of the Foundation for Research and Technology - Hellas (FORTH) and the European Network and Information Security Agency (ENISA).

Cybersecurity - Public Sector Threats and Responses (Hardcover, New): Kim J. Andreasson Cybersecurity - Public Sector Threats and Responses (Hardcover, New)
Kim J. Andreasson
R2,145 Discovery Miles 21 450 Ships in 12 - 17 working days

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks.
An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections:

  1. Global Trends considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field
  2. National and Local Policy Approaches examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government
  3. Practical Considerations explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends

Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.

FISMA Principles and Best Practices - Beyond Compliance (Hardcover): Patrick D. Howard FISMA Principles and Best Practices - Beyond Compliance (Hardcover)
Patrick D. Howard
R3,484 Discovery Miles 34 840 Ships in 12 - 17 working days

While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Principles and Best Practices: Beyond Compliance integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain compliance with FISMA requirements. Based on the author's experience developing, implementing, and maintaining enterprise FISMA-based information technology security programs at three major federal agencies, including the U.S. Department of Housing and Urban Development, the book gives you workable solutions for establishing and operating an effective security compliance program. It delineates the processes, practices, and principles involved in managing the complexities of FISMA compliance. Describing how FISMA can be used to form the basis for an enterprise security risk management program, the book: * Provides a comprehensive analysis of FISMA requirements * Highlights the primary considerations for establishing an effective security compliance program * Illustrates successful implementation of FISMA requirements with numerous case studies Clarifying exactly what it takes to gain and maintain FISMA compliance, Pat Howard, CISO of the Nuclear Regulatory Commission, provides detailed guidelines so you can design and staff a compliance capability, build organizational relationships, gain management support, and integrate compliance into the system development life cycle. While there is no such thing as absolute protection, this up-to-date resource reflects the important security concepts and ideas for addressing information security requirements

Blockchain Technology for Industry 4.0 - Secure, Decentralized, Distributed and Trusted Industry Environment (Hardcover, 1st... Blockchain Technology for Industry 4.0 - Secure, Decentralized, Distributed and Trusted Industry Environment (Hardcover, 1st ed. 2020)
Rodrigo Da Rosa Righi, Antonio Marcos Alberti, Madhusudan Singh
R3,937 Discovery Miles 39 370 Ships in 12 - 17 working days

This book explores recent advances in blockchain technology and its impact on Industry 4.0 via advanced technologies. It provides an in-depth analysis of the step by step evolution of Industry 4.0 and blockchain technologies for creating the next-generation, secure, decentralized, distributed and trusted industry environment and enhancing the productivity of industries. The book describes how blockchain technology makes the industrial internet (Industry 4.0) a transparent, reliable and secure environment for people, processes, systems, and services, presenting a strong, technological and conceptual framework and roadmap for decision-makers involved in the transformation of any area of industry.

Cyber Dragon - Inside China's Information Warfare and Cyber Operations (Hardcover): Dean Cheng Cyber Dragon - Inside China's Information Warfare and Cyber Operations (Hardcover)
Dean Cheng
R1,859 Discovery Miles 18 590 Ships in 10 - 15 working days

This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts. China combines financial firepower-currently the world's second largest economy-with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military and security developments, this work taps materials the Chinese military uses to educate its own officers to explain the bigger-picture thinking that motivates Chinese cyber warfare. Readers will be able to place the key role of Chinese cyber operations in the overall context of how the Chinese military thinks future wars will be fought and grasp how Chinese computer network operations, including various hacking incidents, are part of a larger, different approach to warfare. The book's explanations of how the Chinese view information's growing role in warfare will benefit U.S. policymakers, while students in cyber security and Chinese studies will better understand how cyber and information threats work and the seriousness of the threat posed by China specifically. Provides a detailed overview and thorough analysis of Chinese cyber activities Makes extensive use of Chinese-language materials, much of which has not been utilized in the existing Western literature on the subject Enables a better understanding of Chinese computer espionage by placing it in the context of broader Chinese information warfare activities Analyzes Chinese military modernization efforts, providing a context for the ongoing expansion in China's military spending and reorganization Offers readers policy-relevant insight into Chinese military thinking while maintaining academic-level rigor in analysis and source selection

The Art of Intrusion - The Real Stories Behind the  Exploits of Hackers, Intruders, and Deceivers (Hardcover): KD Mitnick The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers (Hardcover)
KD Mitnick
R1,028 R761 Discovery Miles 7 610 Save R267 (26%) Ships in 12 - 17 working days

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling "The Art of Deception"
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machinesTwo teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systemsTwo convicts who joined forces to become hackers inside a Texas prisonA "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained accessWith riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Data Analytics for Cybersecurity (Hardcover, New edition): Vandana P. Janeja Data Analytics for Cybersecurity (Hardcover, New edition)
Vandana P. Janeja
R1,901 R1,569 Discovery Miles 15 690 Save R332 (17%) Ships in 12 - 17 working days

As the world becomes increasingly connected, it is also more exposed to a myriad of cyber threats. We need to use multiple types of tools and techniques to learn and understand the evolving threat landscape. Data is a common thread linking various types of devices and end users. Analyzing data across different segments of cybersecurity domains, particularly data generated during cyber-attacks, can help us understand threats better, prevent future cyber-attacks, and provide insights into the evolving cyber threat landscape. This book takes a data oriented approach to studying cyber threats, showing in depth how traditional methods such as anomaly detection can be extended using data analytics and also applies data analytics to non-traditional views of cybersecurity, such as multi domain analysis, time series and spatial data analysis, and human-centered cybersecurity.

AI-Enabled Threat Detection and Security Analysis for Industrial IoT (Paperback, 1st ed. 2021): Hadis Karimipour, Farnaz... AI-Enabled Threat Detection and Security Analysis for Industrial IoT (Paperback, 1st ed. 2021)
Hadis Karimipour, Farnaz Derakhshan
R4,458 Discovery Miles 44 580 Ships in 10 - 15 working days

This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. Each chapter corresponds to an important snapshot including an overview of the opportunities and challenges of realizing the AI in IIoT environments, issues related to data security, privacy and application of blockchain technology in the IIoT environment. This book also examines more advanced and specific topics in AI-based solutions developed for efficient anomaly detection in IIoT environments. Different AI/ML techniques including deep representation learning, Snapshot Ensemble Deep Neural Network (SEDNN), federated learning and multi-stage learning are discussed and analysed as well. Researchers and professionals working in computer security with an emphasis on the scientific foundations and engineering techniques for securing IIoT systems and their underlying computing and communicating systems will find this book useful as a reference. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, cyber security, and information systems. It also applies to advanced-level students studying electrical engineering and system engineering, who would benefit from the case studies.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fifth International Symposium on... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) (Paperback, 1st ed. 2021)
Yang Xu, Yongbin Sun, Yanyang Liu, Feng Gao, Pengfei Gu, …
R4,370 Discovery Miles 43 700 Ships in 10 - 15 working days

This book is a compilation of selected papers from the fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in November 2020 in Beijing, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and nuclear power practitioners, and for the combination of production, teaching and research in universities and enterprises to promote the safe development of nuclear power plant. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Cybersecurity Mindset - A Virtual…
Dewayne Hart Hardcover R720 Discovery Miles 7 200
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,221 Discovery Miles 12 210
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R500 Discovery Miles 5 000
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560
Cybersecurity - A Simple Beginner's…
Quinn Kiser Hardcover R724 R603 Discovery Miles 6 030
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
Real-Time and Retrospective Analyses of…
David Anthony Bird Hardcover R5,612 Discovery Miles 56 120
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R2,779 Discovery Miles 27 790
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960

 

Partners