0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (589)
  • R500+ (5,151)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The 7 Qualities of Highly Secure Software (Hardcover): Mano Paul The 7 Qualities of Highly Secure Software (Hardcover)
Mano Paul
R1,977 Discovery Miles 19 770 Ships in 10 - 15 working days

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book: Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations Specifies the qualities and skills that are essential for building secure software Highlights the parallels between the habits of effective people and qualities in terms of software security Praise for the Book: This will be required reading for my executives, security team, software architects and lead developers.-David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.-Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.-Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas

Security in Embedded Devices (Hardcover, 2010 ed.): Catherine H. Gebotys Security in Embedded Devices (Hardcover, 2010 ed.)
Catherine H. Gebotys
R4,175 Discovery Miles 41 750 Ships in 18 - 22 working days

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of ensuring the implementation will also be secure from attacks, security design remains a challenge. This book provides the foundations for understanding embedded security design, outlining various aspects of security in devices ranging from typical wireless devices such as PDAs through to contactless smartcards to satellites.

International Conference on Communication, Computing and Electronics Systems - Proceedings of ICCCES 2020 (Hardcover, 1st ed.... International Conference on Communication, Computing and Electronics Systems - Proceedings of ICCCES 2020 (Hardcover, 1st ed. 2021)
V. Bindhu, Joao Manuel R.S. Tavares, Alexandros-Apostolos A. Boulogeorgos, Chandrasekar Vuppalapati
R7,132 Discovery Miles 71 320 Ships in 18 - 22 working days

This book includes high-quality papers presented at the International Conference on Communication, Computing and Electronics Systems 2020, held at the PPG Institute of Technology, Coimbatore, India, on 21-22 October 2020. The book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics.

Securing the Cloud - Cloud Computer Security Techniques and Tactics (Paperback): Vic (J. R.) Winkler Securing the Cloud - Cloud Computer Security Techniques and Tactics (Paperback)
Vic (J. R.) Winkler
R1,286 Discovery Miles 12 860 Ships in 10 - 15 working days

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. "Securing the Cloud" discusses making the move to the cloud while securing your piece of it The cloud offers flexibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, or services. The author offers a clear and concise framework to secure your business' assets while making the most of this new technology.
Named The 2011 Best Identity Management Book by "InfoSec Reviews"Provides a sturdy and stable framework to secure your piece of the cloud, consideringalternate approaches such as private vs. public clouds, SaaS vs. IaaS, and loss of control and lack of trustDiscusses the cloud's impact on security roles, highlighting security as a service, data backup, and disaster recoveryDetails the benefits of moving to the cloud-solving for limited availability of space, power, and storage"

Cybersecurity for Industrial Control Systems - SCADA, DCS, PLC, HMI, and SIS (Hardcover): Tyson Macaulay, Bryan L. Singer Cybersecurity for Industrial Control Systems - SCADA, DCS, PLC, HMI, and SIS (Hardcover)
Tyson Macaulay, Bryan L. Singer
R2,596 Discovery Miles 25 960 Ships in 10 - 15 working days

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New): Gilbert N. Sorebo, Michael C.... Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New)
Gilbert N. Sorebo, Michael C. Echols
R4,511 Discovery Miles 45 110 Ships in 10 - 15 working days

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid. Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security ExaminersFollowing an overview of the components of the Smart Grid, the book delves into the evolution of security standards and regulations and examines ways in which the Smart Grid might be regulated. The authors discuss the technical details about how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission-the foundation for the delivery of electricity, along with distributed generation, micro-grids, and operations. The book explores future concepts-such as energy storage and the use of plug-in electric vehicles (PEVs)-in addition to the concomitant risk for fraud and manipulation with stored energy. Consumer-related issues are discussed as they pertain to emerging ways of receiving and generating energy. The book examines dysfunctions ranging from inadvertent outages to cyber-attack and presents recommendations on how to respond to these incidents. It concludes with speculation of future cyber-security challenges and discusses new ways that the grid can be defended, such as better key management and protection. Written in a style rigorous enough for the practitioner yet accessible to a broad audience, this comprehensive volume covers a topic that is becoming more critical to industry and consumers everywhere.

Thor's Microsoft Security Bible - A Collection of Practical Security Techniques (Hardcover): Timothy "Thor" Mullen Thor's Microsoft Security Bible - A Collection of Practical Security Techniques (Hardcover)
Timothy "Thor" Mullen
R1,214 R915 Discovery Miles 9 150 Save R299 (25%) Ships in 10 - 15 working days

Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples. This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, and application specific security (IIS, SQL, Active Directory, etc.). It also includes new, never-before-published security tools complete with source code; detailed technical information on security processes for all major Microsoft applications; unique project-based storytelling delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases; reference-style content for access to specific application security techniques and methods; actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so. This book will be of interest to systems and network administrators, IT managers, security and network engineers, and database administrators.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Second International Symposium on... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (Hardcover, 1st ed. 2018)
Yang Xu, Feng Gao, Wei Hua Chen, Zheming Liu, Pengfei Gu
R5,183 Discovery Miles 51 830 Ships in 18 - 22 working days

This book gathers selected papers from the Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in Chengdu, China on August 23-25, 2017. The symposium provided a platform of technical exchange and experience sharing for a broad range of experts, scholars and nuclear power practitioners. The book reflects the state of the art and latest trends in nuclear instrumentation and control system technologies, as well as China's growing influence in this area. It offers a valuable resource for both practitioners and academics working in the field of nuclear instrumentation, control systems and other safety-critical systems, as well as nuclear power plant managers, public officials and regulatory authorities.

Incident Response & Computer Forensics, Third Edition (Paperback, 3rd edition): Jason Luttgens, Matthew Pepe, Kevin Mandia Incident Response & Computer Forensics, Third Edition (Paperback, 3rd edition)
Jason Luttgens, Matthew Pepe, Kevin Mandia
R1,646 R1,065 Discovery Miles 10 650 Save R581 (35%) Ships in 10 - 15 working days

"The all-new edition of this security bestseller covers the latest techniques, tools, and case scenarios to help incident responders react quickly and efficiently to data breaches."

"Incident Response and Computer Forensics, Third Edition" is a fully updated edition of the bestselling technical guide that arms you with the right know-how to get your organization out of trouble when data breaches occur.

This new edition is chock-full of updates about tools and techniques as well as new real-world scenarios reflecting today's most common types of incidents. Detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics--knowing where and how to look into computers for evidence of wrongdoing. New chapters on investigation techniques, indicators of compromise, and remediation New advice on architecting networks from the ground-up to fight intrusions and on streamlining intrusion diagnoses for faster recovery Substantial updates on investigating Windows systems, malware analysis, memory analysis, application analysis, data collection, report writing, and incident management The most relevant tips and tricks for a forensics-forward approach to handling and protecting sensitive data without compromising systems further New and updated information for managers and business leaders to prepare for and manage an incident

Introduction to Intelligent Surveillance - Surveillance Data Capture, Transmission, and Analytics (Hardcover, 3rd ed. 2019):... Introduction to Intelligent Surveillance - Surveillance Data Capture, Transmission, and Analytics (Hardcover, 3rd ed. 2019)
Weiqi Yan
R1,647 Discovery Miles 16 470 Ships in 18 - 22 working days

This practically-oriented textbook introduces the fundamentals of designing digital surveillance systems powered by intelligent computing techniques. The text offers comprehensive coverage of each aspect of the system, from camera calibration and data capture, to the secure transmission of surveillance data, in addition to the detection and recognition of individual biometric features and objects. The coverage concludes with the development of a complete system for the automated observation of the full lifecycle of a surveillance event, enhanced by the use of artificial intelligence and supercomputing technology. This updated third edition presents an expanded focus on human behavior analysis and privacy preservation, as well as deep learning methods. Topics and features: contains review questions and exercises in every chapter, together with a glossary; describes the essentials of implementing an intelligent surveillance system and analyzing surveillance data, including a range of biometric characteristics; examines the importance of network security and digital forensics in the communication of surveillance data, as well as issues of issues of privacy and ethics; discusses the Viola-Jones object detection method, and the HOG algorithm for pedestrian and human behavior recognition; reviews the use of artificial intelligence for automated monitoring of surveillance events, and decision-making approaches to determine the need for human intervention; presents a case study on a system that triggers an alarm when a vehicle fails to stop at a red light, and identifies the vehicle's license plate number; investigates the use of cutting-edge supercomputing technologies for digital surveillance, such as FPGA, GPU and parallel computing. This concise and accessible work serves as a classroom-tested textbook for graduate-level courses on intelligent surveillance. Researchers and engineers interested in entering this area will also find the book suitable as a helpful self-study reference.

Lattice Basis Reduction - An Introduction to the LLL Algorithm and Its Applications (Hardcover, New): Murray R. Bremner Lattice Basis Reduction - An Introduction to the LLL Algorithm and Its Applications (Hardcover, New)
Murray R. Bremner
R3,665 Discovery Miles 36 650 Ships in 10 - 15 working days

First developed in the early 1980s by Lenstra, Lenstra, and Lov sz, the LLL algorithm was originally used to provide a polynomial-time algorithm for factoring polynomials with rational coefficients. It very quickly became an essential tool in integer linear programming problems and was later adapted for use in cryptanalysis. This book provides an introduction to the theory and applications of lattice basis reduction and the LLL algorithm. With numerous examples and suggested exercises, the text discusses various applications of lattice basis reduction to cryptography, number theory, polynomial factorization, and matrix canonical forms.

Machine Learning Forensics for Law Enforcement, Security, and Intelligence (Hardcover, New): Jesus Mena Machine Learning Forensics for Law Enforcement, Security, and Intelligence (Hardcover, New)
Jesus Mena
R3,950 Discovery Miles 39 500 Ships in 10 - 15 working days

Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data. To combat this unlawful activity, knowledge about the use of machine learning technology and software is critical. Machine Learning Forensics for Law Enforcement, Security, and Intelligence integrates an assortment of deductive and instructive tools, techniques, and technologies to arm professionals with the tools they need to be prepared and stay ahead of the game.

Step-by-step instructions

The book is a practical guide on how to conduct forensic investigations using self-organizing clustering map (SOM) neural networks, text extraction, and rule generating software to "interrogate the evidence." This powerful data is indispensable for fraud detection, cybersecurity, competitive counterintelligence, and corporate and litigation investigations. The book also provides step-by-step instructions on how to construct adaptive criminal and fraud detection systems for organizations.

Prediction is the key

Internet activity, email, and wireless communications can be captured, modeled, and deployed in order to anticipate potential cyber attacks and other types of crimes. The successful prediction of human reactions and server actions by quantifying their behaviors is invaluable for pre-empting criminal activity. This volume assists chief information officers, law enforcement personnel, legal and IT professionals, investigators, and competitive intelligence analysts in the strategic planning needed to recognize the patterns of criminal activities in order to predict when and where crimes and intrusions are likely to take place.

Web Application Obfuscation - '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' (Paperback): Mario Heiderich, Eduardo... Web Application Obfuscation - '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' (Paperback)
Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay
R991 R867 Discovery Miles 8 670 Save R124 (13%) Ships in 10 - 15 working days

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. "Web Application Obfuscation "takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new types of vulnerabilities, and how to avoid common pitfalls in order to strengthen your defenses.
Named a 2011 Best Hacking and Pen Testing Book by "InfoSec Reviews"Looks at security tools like IDS/IPS that are often the only defense in protecting sensitive data and assetsEvaluates Web application vulnerabilties from the attacker's perspective and explains how these very systems introduce new types of vulnerabilitiesTeaches how to secure your data, including info on browser quirks, new attacks and syntax tricks to add to your defenses against XSS, SQL injection, and more

Data Mining and Machine Learning in Cybersecurity (Hardcover): Sumeet Dua, Xian Du Data Mining and Machine Learning in Cybersecurity (Hardcover)
Sumeet Dua, Xian Du
R2,799 Discovery Miles 27 990 Ships in 10 - 15 working days

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need. From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges-detailing cutting-edge machine learning and data mining techniques. It also: Unveils cutting-edge techniques for detecting new attacks Contains in-depth discussions of machine learning solutions to detection problems Categorizes methods for detecting, scanning, and profiling intrusions and anomalies Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions Details privacy-preserving data mining methods This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

Security Patch Management (Hardcover): Felicia Nicastro Security Patch Management (Hardcover)
Felicia Nicastro
R2,812 Discovery Miles 28 120 Ships in 10 - 15 working days

Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that's often left to the last minute or resolved with products that automate the task. Effective patch management is not about technology; it's about having a formal process in place that can deploy patches to vulnerable systems quickly. Helping you figure out exactly what to patch and which patches to use, Security Patch Management provides detailed guidance through the process of creating and implementing an effective and efficient patch management process. It uses a format that is easy-to-understand and applicable regardless of the operating system, network device, or patch deployment tool. The author illustrates the proper implementation of patches on devices and systems within various infrastructures to provide the insight required to: Design your own patch release process and keep it action ready Test the effectiveness of your patches Keep up with the latest patch releases Prioritize the vulnerabilities that need to be addressed Apply patches quickly and without draining essential network resources This book supplies the tools and guidelines you need to stay one step ahead of the exploits on the horizon. It will help you establish a patch management process that not only protects your organization against zero-day attacks, but also helps you become more proactive when it comes to this critical facet of information security.

Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.): Jeffrey J.P. Tsai, Zhenwei Yu Intrusion Detection: A Machine Learning Approach (Hardcover, 3rd ed.)
Jeffrey J.P. Tsai, Zhenwei Yu
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This important textbook introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.

Trust, Complexity and Control - Confidence in a Convergent World (Hardcover): P Cofta Trust, Complexity and Control - Confidence in a Convergent World (Hardcover)
P Cofta
R2,818 Discovery Miles 28 180 Ships in 18 - 22 working days

An increasing reliance on the Internet and mobile communication has deprived us of our usual means of assessing another party's trustworthiness. This is increasingly forcing us to rely on control. Yet the notion of trust and trustworthiness is essential to the continued development of a technology-enabled society.

"Trust, Complexity and Control" offers readers a single, consistent explanation of how the sociological concept of 'trust' can be applied to a broad spectrum of technology-related areas; convergent communication, automated agents, digital security, semantic web, artificial intelligence, e-commerce, e-government, privacy etc. It presents a model of confidence in which trust and control are driven and limited by complexity in one explanatory framework and demonstrates how that framework can be applied to different research and application areas. Starting with the individual's assessment of trust, the book shows the reader how application of the framework can clarify misunderstandings and offer solutions to complex problems.

The uniqueness of "Trust, Complexity and Control" is its interdisciplinary treatment of a variety of diverse areas using a single framework.

Sections featured include:

- Trust and distrust in the digital world.

- The impact of convergent communication and networks on trust.

- Trust, economy and commerce.

- Trust-enhancing technologies.

"Trust, Complexity and Control" is an invaluable source of reference for both researchers and practitioners within the Trust community. It will also be of benefit to students and lecturers in the fields of information technology, social sciences and computer engineering.

Hardware Security and Trust - Design and Deployment of Integrated Circuits in a Threatened Environment (Hardcover, 1st ed.... Hardware Security and Trust - Design and Deployment of Integrated Circuits in a Threatened Environment (Hardcover, 1st ed. 2017)
Nicolas Sklavos, Ricardo Chaves, Giorgio Di Natale, Francesco Regazzoni
R4,008 Discovery Miles 40 080 Ships in 10 - 15 working days

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.

Honeypots - A New Paradigm to Information Security (Hardcover): R.C. Joshi, Anjali Sardana Honeypots - A New Paradigm to Information Security (Hardcover)
R.C. Joshi, Anjali Sardana
R5,490 Discovery Miles 54 900 Ships in 10 - 15 working days

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

Firewall Design And Analysis (Hardcover): Alex X. Liu Firewall Design And Analysis (Hardcover)
Alex X. Liu
R2,074 Discovery Miles 20 740 Ships in 18 - 22 working days

This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies.This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.

Security and Policy Driven Computing (Hardcover, New): Lei Liu Security and Policy Driven Computing (Hardcover, New)
Lei Liu
R4,930 Discovery Miles 49 300 Ships in 10 - 15 working days

Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention. An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

Entity Authentication and Personal Privacy in Future Cellular Systems (Hardcover): Geir M. Koien Entity Authentication and Personal Privacy in Future Cellular Systems (Hardcover)
Geir M. Koien
R2,711 Discovery Miles 27 110 Ships in 10 - 15 working days

In the first quarter of 2009, there were more than 4 billion subscribers to cellular phone services in the world and this number is constantly growing. With this in mind it should be clear that use of mobile communication has already become both pervasive and ubiquitous. It has become a global commodity really. Entity Authentication and Personal Privacy in Future Cellular Systems aims at explaining and examining access security as it is found in mobile/cellular systems. A thorough investigation of how access security and personal privacy is handled in the 3GPP system is conducted. This includes both the 2G systems GSM/GPRS and the 3G system UMTS. The emerging fourth generation LTE architecture is also examined. The first part of the book deals exclusively with presenting access security as found in the 3GPP system. Particular attention is given to the authentication and key agreement procedures. The 3GPP systems have evolved and the access security architecture in LTE is substantially more advanced and mature than what you would find in GSM/GPRS, but even the LTE security architecture has its limitations. In part two of the book we go on to examine what is missing from the current cellular access security architectures. Some of the shortcomings found in GSM/GPRS and later UMTS have been partially addressed in LTE, but the burden of backwards compatibility has meant that many issues could not easily be resolved. Free from those restrictions, we shall see that one can provide substantially improved subscriber privacy and enhanced entity authentication, while also avoiding the delegated authentication control that all 3GPP systems have. The design of authentication protocols is discussed in depth, and this would also include looking into the role of formal verification in the design of security protocols.

Security of Self-Organizing Networks - MANET, WSN, WMN, VANET (Hardcover): Al-Sakib Khan Pathan Security of Self-Organizing Networks - MANET, WSN, WMN, VANET (Hardcover)
Al-Sakib Khan Pathan
R4,129 Discovery Miles 41 290 Ships in 10 - 15 working days

Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats. Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference: 1. General Topics -- Security of Wireless and Self-Organizing Networks 2. Mobile Ad-Hoc Network and Vehicular Ad-Hoc Network Security 3. Wireless Sensor Network Security 4. Wireless Mesh Network Security Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce understanding.

Security for Microsoft Windows System Administrators - Introduction to Key Information Security Concepts (Paperback): Derrick... Security for Microsoft Windows System Administrators - Introduction to Key Information Security Concepts (Paperback)
Derrick Rountree
R730 R598 Discovery Miles 5 980 Save R132 (18%) Ships in 10 - 15 working days

Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that cover details about network attacks, system failures, audits, and social networking. The book introduces general security concepts including the principles of information security, standards, regulation, and compliance; authentication, authorization, and accounting; and access control. It also covers the cryptography and the principles of network, system, and organizational and operational security, including risk analysis and disaster recovery. The last part of the book presents assessments and audits of information security, which involve methods of testing, monitoring, logging, and auditing. This handy guide offers IT practitioners, systems and network administrators, and graduate and undergraduate students in information technology the details they need about security concepts and issues. Non-experts or beginners in Windows systems security will also find this book helpful.

Trusted Computing for Embedded Systems (Hardcover, 2015 ed.): Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos Trusted Computing for Embedded Systems (Hardcover, 2015 ed.)
Bernard Candaele, Dimitrios Soudris, Iraklis Anagnostopoulos
R4,276 R3,475 Discovery Miles 34 750 Save R801 (19%) Ships in 10 - 15 working days

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. * Enables readers to address a variety of security threats to embedded hardware and software; * Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; * Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R5,931 Discovery Miles 59 310
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Guide to Computer Forensics and…
Amelia Phillips, Bill Nelson, … Paperback R1,345 R1,248 Discovery Miles 12 480
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R947 R826 Discovery Miles 8 260
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Security in IoT Social Networks
Fadi Al-Turjman, B.D. Deebak Paperback R2,634 Discovery Miles 26 340

 

Partners