0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (272)
  • R250 - R500 (605)
  • R500+ (5,289)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The Internet of Things - What Everyone Needs to Know (R) (Hardcover): Scott J. Shackelford The Internet of Things - What Everyone Needs to Know (R) (Hardcover)
Scott J. Shackelford
R1,051 Discovery Miles 10 510 Ships in 12 - 17 working days

The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention paid to how we should go about regulating smart devices, and still less about how cybersecurity should be enhanced. Similarly, now that everything from refrigerators to stock exchanges can be connected to a ubiquitous Internet, how can we better safeguard privacy across networks and borders? Will security scale along with this increasingly crowded field? Or, will a combination of perverse incentives, increasing complexity, and new problems derail progress and exacerbate cyber insecurity? For all the press that such questions have received, the Internet of Everything remains a topic little understood or appreciated by the public. This volume demystifies our increasingly "smart" world, and unpacks many of the outstanding security, privacy, ethical, and policy challenges and opportunities represented by the IoE. Scott J. Shackelford provides real-world examples and straightforward discussion about how the IoE is impacting our lives, companies, and nations, and explain how it is increasingly shaping the international community in the twenty-first century. Are there any downsides of your phone being able to unlock your front door, start your car, and control your thermostat? Is your smart speaker always listening? How are other countries dealing with these issues? This book answers these questions, and more, along with offering practical guidance for how you can join the effort to help build an Internet of Everything that is as secure, private, efficient, and fun as possible.

Information Security Management - Concepts and Practice (Hardcover): Bel G. Raggad Information Security Management - Concepts and Practice (Hardcover)
Bel G. Raggad
R2,856 Discovery Miles 28 560 Ships in 12 - 17 working days

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs.

An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.

This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment?including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.

Information Centric Networks (ICN) - Architecture & Current Trends (Paperback, 1st ed. 2021): Nitul Dutta, Hiren Kumar Deva... Information Centric Networks (ICN) - Architecture & Current Trends (Paperback, 1st ed. 2021)
Nitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea
R4,921 Discovery Miles 49 210 Ships in 10 - 15 working days

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.

The Executive MBA in Information Security (Hardcover): Jr., John J. Trinckes The Executive MBA in Information Security (Hardcover)
Jr., John J. Trinckes
R3,764 Discovery Miles 37 640 Ships in 12 - 17 working days

According to the Brookings Institute, an organization s information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of information security programs, it is essential for those in key leadership positions to possess a solid understanding of the constantly evolving fundamental concepts of information security management. Developing this knowledge and keeping it current however, requires the time and energy that busy executives like you simply don t have.

Supplying a complete overview of key concepts, The Executive MBA in Information Security provides the tools needed to ensure your organization has an effective and up-to-date information security management program in place. This one-stop resource provides a ready-to use security framework you can use to develop workable programs and includes proven tips for avoiding common pitfalls so you can get it right the first time.

Allowing for quick and easy reference, this time-saving manual provides those in key leadership positions with a lucid understanding of:

  • The difference between information security and IT security
  • Corporate governance and how it relates to information security
  • Steps and processes involved in hiring the right information security staff
  • The different functional areas related to information security
  • Roles and responsibilities of the chief information security officer (CISO)

Presenting difficult concepts in a straightforward manner, this concise guide allows you to get up to speed, quickly and easily, on what it takes to develop a rock-solid information security management program that is as flexible as it is secure.

Smart Log Data Analytics - Techniques for Advanced Security Analysis (Paperback, 1st ed. 2021): Florian Skopik, Markus... Smart Log Data Analytics - Techniques for Advanced Security Analysis (Paperback, 1st ed. 2021)
Florian Skopik, Markus Wurzenberger, Max Landauer
R4,207 Discovery Miles 42 070 Ships in 10 - 15 working days

This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.

Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Paperback, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Paperback, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R4,925 Discovery Miles 49 250 Ships in 10 - 15 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event,... Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings (Paperback, 1st ed. 2021)
Steven Furnell, Nathan Clarke
R2,771 Discovery Miles 27 710 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.

Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and... Advances in Security, Networks, and Internet of Things - Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 (Paperback, 1st ed. 2021)
Kevin Daimi, Hamid R Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti
R7,524 Discovery Miles 75 240 Ships in 10 - 15 working days

The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems; Features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.

Security in RFID and Sensor Networks (Hardcover): Paris Kitsos Security in RFID and Sensor Networks (Hardcover)
Paris Kitsos
R2,476 Discovery Miles 24 760 Ships in 12 - 17 working days

In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, providing an essential reference for those who regularly interface with these versatile technologies. Exposes Security Risks The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications. Offers Viable Solutions In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.

Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Hardcover, 2009 ed.)
Dimitris Gritzalis, Javier Lopez
R2,867 Discovery Miles 28 670 Ships in 10 - 15 working days

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the call for papers, 176 papers were submitted to the conference. All of them were evaluated on the basis of their novelty and technical quality, and reviewed by at least two members of the conference Program Committee. Of the papers submitted, 39 were selected for presentation at the conference; the acceptance rate was as low as 22%, thus making the conference a highly competitive forum. It is the commitment of several people that makes international conferences pos- ble. That also holds true for SEC 2009. The list of people who volunteered their time and energy to help is really long.

ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24,... ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Paperback, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
R4,038 Discovery Miles 40 380 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management. *The conference was held virtually.

Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 2 (Paperback, 1st ed. 2021): Sabu M.... Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 2 (Paperback, 1st ed. 2021)
Sabu M. Thampi, Erol Gelenbe, Mohammed Atiquzzaman, Vipin Chaudhary, Kuan-Ching Li
R5,526 Discovery Miles 55 260 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.

Safety, Security and Privacy for Cyber-Physical Systems (Paperback, 1st ed. 2021): Riccardo M.G. Ferrari, Andre M. H. Teixeira Safety, Security and Privacy for Cyber-Physical Systems (Paperback, 1st ed. 2021)
Riccardo M.G. Ferrari, Andre M. H. Teixeira
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.

Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24,... Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24, 2021, Proceedings (Paperback, 1st ed. 2021)
Lynette Drevin, Natalia Miloslavskaya, Wai Sze Leung, Sune Von Solms
R2,511 Discovery Miles 25 110 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th IFIP WG 11.8 World Conference on Information Security Education, WISE 14, held virtually in June 2021. The 8 papers presented together with a special chapter showcasing the history of WISE and two workshop papers were carefully reviewed and selected from 19 submissions. The papers are organized in the following topical sections: a roadmap for building resilience; innovation in curricula; teaching methods and tools; and end-user security.

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques... Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques (Paperback, 1st ed. 2021)
Satyanarayana Vollala, N. Ramasubramanian, Utkarsh Tiwari
R4,943 Discovery Miles 49 430 Ships in 10 - 15 working days

Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.

Privacy-Preserving in Edge Computing (Paperback, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Paperback, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R4,180 Discovery Miles 41 800 Ships in 10 - 15 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Sensemaking for Security (Paperback, 1st ed. 2021): Anthony J. Masys Sensemaking for Security (Paperback, 1st ed. 2021)
Anthony J. Masys
R4,227 Discovery Miles 42 270 Ships in 10 - 15 working days

This book presents sensemaking strategies to support security planning and design. Threats to security are becoming complex and multifaceted and increasingly challenging traditional notions of security. The security landscape is characterized as 'messes' and 'wicked problems' that proliferate in this age of complexity. Designing security solutions in the face of interconnectedness, volatility and uncertainty, we run the risk of providing the right answer to the wrong problem thereby resulting in unintended consequences. Sensemaking is the activity that enables us to turn the ongoing complexity of the world into a "situation that is comprehended explicitly in words and that serves as a springboard into action" (Weick, Sutcliffe, Obstfeld, 2005). It is about creating an emerging picture of our world through data collection, analysis, action, and reflection. The importance of sensemaking to security is that it enables us to plan, design and act when the world as we knew it seems to have shifted. Leveraging the relevant theoretical grounding and thought leadership in sensemaking, key examples are provided, thereby illustrating how sensemaking strategies can support security planning and design. This is a critical analytical and leadership requirement in this age of volatility, uncertainty, complexity and ambiguity that characterizes the security landscape. This book is useful for academics, graduate students in global security, and government and security planning practitioners.

Guide to Computer Forensics and Investigations (Paperback, 6th edition): Amelia Phillips, Bill Nelson, Christopher Steuart Guide to Computer Forensics and Investigations (Paperback, 6th edition)
Amelia Phillips, Bill Nelson, Christopher Steuart
R1,345 R1,202 Discovery Miles 12 020 Save R143 (11%) Ships in 10 - 15 working days

Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides free demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.

System Firmware - An Essential Guide to Open Source and Embedded Solutions (Paperback, 1st ed.): Subrata Banik, Vincent Zimmer System Firmware - An Essential Guide to Open Source and Embedded Solutions (Paperback, 1st ed.)
Subrata Banik, Vincent Zimmer
R1,617 R1,296 Discovery Miles 12 960 Save R321 (20%) Ships in 10 - 15 working days

Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized boot solutions. This book covers system boot firmware, focusing on real-world firmware migration from closed source to open source adaptation. The book provides an architectural overview of popular boot firmware. This includes both closed sourced and/or open source in nature, such as Unified Extensible Firmware Interface (UEFI), coreboot, and Slim Bootloader and their applicable market segments based on product development and deployment requirements. Traditional system firmware is often complex and closed sourced whereas modern firmware is still a kind of hybrid between closed and open source. But what might a future firmware model look like? The most simplistic boot firmware solution uses open source firmware development. This book helps you decide how to choose the right boot firmware for your products and develop your own boot firmware using open source. Coverage includes: Why open source firmware is used over closed source The pros and cons of closed and open source firmware A hybrid work model: for faster bring-up activity using closed source, binary integrated with open source firmware What You Will Learn Understand the architecture of standard and popular boot firmware Pick the correct bootloader for your required target hardware Design a hybrid workflow model for the latest chipset platform Understand popular payload architectures and offerings for embedded systems Select the right payload for your bootloader solution to boot to the operating system Optimize the system firmware boot time based on your target hardware requirement Know the product development cycle using open source firmware development Who This Book Is For Embedded firmware and software engineers migrating the product development from closed source firmware to open source firmware for product adaptation needs as well as engineers working for open source firmware development. A secondary audience includes engineers working on various bootloaders such as open source firmware, UEFI, and Slim Bootloader development, as well as undergraduate and graduate students working on developing firmware skill sets.

Cyber Security Meets National Security - International Perspectives on Digital Era Threats (Hardcover): Neil Kent, Irina du... Cyber Security Meets National Security - International Perspectives on Digital Era Threats (Hardcover)
Neil Kent, Irina du Quenoy
R3,644 Discovery Miles 36 440 Ships in 10 - 15 working days

Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.

Searching for Trust - Blockchain Technology in an Age of Disinformation (Paperback, New Ed): Victoria L. Lemieux Searching for Trust - Blockchain Technology in an Age of Disinformation (Paperback, New Ed)
Victoria L. Lemieux
R935 Discovery Miles 9 350 Ships in 12 - 17 working days

Searching for Trust explores the intersection of trust, disinformation, and blockchain technology in an age of heightened institutional and epistemic mistrust. It adopts a unique archival theoretic lens to delve into how computational information processing has gradually supplanted traditional record keeping, putting at risk a centuries-old tradition of the 'moral defense of the record' and replacing it with a dominant ethos of information-processing efficiency. The author argues that focusing on information-processing efficiency over the defense of records against manipulation and corruption (the ancient task of the recordkeeper) has contributed to a diminution of the trustworthiness of information and a rise of disinformation, with attendant destabilization of the epistemic trust fabric of societies. Readers are asked to consider the potential and limitations of blockchains as the technological embodiment of the moral defense of the record and as means to restoring societal trust in an age of disinformation.

Searching for Trust - Blockchain Technology in an Age of Disinformation (Hardcover, New Ed): Victoria L. Lemieux Searching for Trust - Blockchain Technology in an Age of Disinformation (Hardcover, New Ed)
Victoria L. Lemieux
R2,564 R2,220 Discovery Miles 22 200 Save R344 (13%) Ships in 12 - 17 working days

Searching for Trust explores the intersection of trust, disinformation, and blockchain technology in an age of heightened institutional and epistemic mistrust. It adopts a unique archival theoretic lens to delve into how computational information processing has gradually supplanted traditional record keeping, putting at risk a centuries-old tradition of the 'moral defense of the record' and replacing it with a dominant ethos of information-processing efficiency. The author argues that focusing on information-processing efficiency over the defense of records against manipulation and corruption (the ancient task of the recordkeeper) has contributed to a diminution of the trustworthiness of information and a rise of disinformation, with attendant destabilization of the epistemic trust fabric of societies. Readers are asked to consider the potential and limitations of blockchains as the technological embodiment of the moral defense of the record and as means to restoring societal trust in an age of disinformation.

Recent Trends In Peripheral Security Systems (Paperback, 1st ed. 2021): Abhishek Rawat, Dipankar Deb, Jatin Upadhyay Recent Trends In Peripheral Security Systems (Paperback, 1st ed. 2021)
Abhishek Rawat, Dipankar Deb, Jatin Upadhyay
R3,940 Discovery Miles 39 400 Ships in 10 - 15 working days

This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.

Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover): Dobromir Todorov Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover)
Dobromir Todorov
R3,542 Discovery Miles 35 420 Ships in 12 - 17 working days

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.

Architectural Wireless Networks Solutions and Security Issues (Paperback, 1st ed. 2021): Santosh Kumar Das, Sourav Samanta,... Architectural Wireless Networks Solutions and Security Issues (Paperback, 1st ed. 2021)
Santosh Kumar Das, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, Aboul Ella Hassanien
R4,963 Discovery Miles 49 630 Ships in 10 - 15 working days

This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R2,779 Discovery Miles 27 790
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R500 Discovery Miles 5 000
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R12,087 Discovery Miles 120 870
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R854 Discovery Miles 8 540
A Hacker, I Am
Craig Ford Hardcover R969 R795 Discovery Miles 7 950

 

Partners