0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (274)
  • R250 - R500 (605)
  • R500+ (5,284)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Paperback, 1st ed. 2021): Sabu M.... Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Paperback, 1st ed. 2021)
Sabu M. Thampi, Erol Gelenbe, Mohammed Atiquzzaman, Vipin Chaudhary, Kuan-Ching Li
R8,197 Discovery Miles 81 970 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.

Architectural Wireless Networks Solutions and Security Issues (Paperback, 1st ed. 2021): Santosh Kumar Das, Sourav Samanta,... Architectural Wireless Networks Solutions and Security Issues (Paperback, 1st ed. 2021)
Santosh Kumar Das, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, Aboul Ella Hassanien
R4,963 Discovery Miles 49 630 Ships in 10 - 15 working days

This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.

Smart Systems for E-Health - WBAN Technologies, Security and Applications (Paperback, 1st ed. 2021): Hanen Idoudi, Thierry Val Smart Systems for E-Health - WBAN Technologies, Security and Applications (Paperback, 1st ed. 2021)
Hanen Idoudi, Thierry Val
R4,934 Discovery Miles 49 340 Ships in 10 - 15 working days

The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health.

Transforming Cybersecurity Solutions using Blockchain (Paperback, 1st ed. 2021): Rashmi Agrawal, Neha Gupta Transforming Cybersecurity Solutions using Blockchain (Paperback, 1st ed. 2021)
Rashmi Agrawal, Neha Gupta
R2,771 Discovery Miles 27 710 Ships in 10 - 15 working days

This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. The book's security and privacy analysis help with an understanding of the basics of blockchain, and it explores the quantifying impact of the new attack surfaces introduced by blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. It follows a practical approach to help understand how blockchain technology is used to transform cybersecurity solutions.

Security Issues and Privacy Threats in Smart Ubiquitous Computing (Paperback, 1st ed. 2021): Parikshit N. Mahalle, Gitanjali R.... Security Issues and Privacy Threats in Smart Ubiquitous Computing (Paperback, 1st ed. 2021)
Parikshit N. Mahalle, Gitanjali R. Shinde, Nilanjan Dey, Aboul Ella Hassanien
R4,941 Discovery Miles 49 410 Ships in 10 - 15 working days

This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

Managing the Human Factor in Information Security - How to win over staff and influence business managers (Paperback): d Lacey Managing the Human Factor in Information Security - How to win over staff and influence business managers (Paperback)
d Lacey
R900 R680 Discovery Miles 6 800 Save R220 (24%) Ships in 12 - 17 working days

With the growth in social networking and the potential for larger and larger breaches of sensitive data, it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing threats, managing politics, developing programs, and getting a business to buy into a security plan. Illustrated with real-world examples throughout, this is a must-have guide for security and IT professionals

Information Security Governance - Framework and Toolset for CISOs and Decision Makers (Paperback): Andrej Volchkov Information Security Governance - Framework and Toolset for CISOs and Decision Makers (Paperback)
Andrej Volchkov
R1,696 Discovery Miles 16 960 Ships in 12 - 17 working days

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

Information Security Cost Management (Hardcover): Ioana V. Bazavan, Ian Lim Information Security Cost Management (Hardcover)
Ioana V. Bazavan, Ian Lim
R2,902 Discovery Miles 29 020 Ships in 12 - 17 working days

While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- -Focuses on setting the right road map so that you can be most effective in your information security implementations -Discusses cost-effective staffing, the single biggest expense to the security organization -Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively -Identifies high-risk areas, focusing limited resources on the most imminent and severe threats -Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.

Security in Sensor Networks (Hardcover): Yang Xiao Security in Sensor Networks (Hardcover)
Yang Xiao
R3,485 Discovery Miles 34 850 Ships in 12 - 17 working days

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks. About the Author Before joining the Department of Computer Science at the University of Alabama in 2006, and his prior position at the University of Memphis in 2002, Dr. Yang Xiao was an accomplished Medium Access Control (MAC) architect deeply involved in IEEE 802.11 standard enhancement. A former voting member of IEEE 802.11 Working Group, he serves as editor or on the editorial boards of numerous prestigious journals that cover emerging topics within mobile and wireless computing. A co-editor of seven books, he also serves as a referee/reviewer for many funding agencies, as well as a panelist for the National Science Foundation.

Collaborative Financial Infrastructure Protection - Tools, Abstractions, and Middleware (Hardcover, 2012 Ed.): Roberto Baldoni,... Collaborative Financial Infrastructure Protection - Tools, Abstractions, and Middleware (Hardcover, 2012 Ed.)
Roberto Baldoni, Gregory Chockler
R2,806 Discovery Miles 28 060 Ships in 10 - 15 working days

The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often subject to some of the most sophisticated and large-scale cyber attacks and frauds.

The book by Baldoni and Chockler analyzes the structure of software infrastructures found in the financial domain, their vulnerabilities to cyber attacks and the existing protection mechanisms. It then shows the advantages of sharing information among financial players in order to detect and quickly react to cyber attacks. Various aspects associated with information sharing are investigated from the organizational, cultural and legislative perspectives. The presentation is organized in two parts: Part I explores general issues associated with information sharing in the financial sector and is intended to set the stage for the vertical IT middleware solution proposed in Part II. Nonetheless, it is self-contained and details a survey of various types of critical infrastructure along with their vulnerability analysis, which has not yet appeared in a textbook-style publication elsewhere. Part II then presents the CoMiFin middleware for collaborative protection of the financial infrastructure.

The material is presented in an accessible style and does not require specific prerequisites. It appeals to both researchers in the areas of security, distributed systems, and event processing working on new protection mechanisms, and practitioners looking for a state-of-the-art middleware technology to enhance the security of their critical infrastructures in e.g. banking, military, and other highly sensitive applications. The latter group will especially appreciate the concrete usage scenarios included.

Security and Privacy - Select Proceedings of ICSP 2020 (Paperback, 1st ed. 2021): Pantelimon Stanica, Sugata Gangopadhyay,... Security and Privacy - Select Proceedings of ICSP 2020 (Paperback, 1st ed. 2021)
Pantelimon Stanica, Sugata Gangopadhyay, Sumit Kumar Debnath
R2,759 Discovery Miles 27 590 Ships in 10 - 15 working days

This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

Data Driven Approach Towards Disruptive Technologies - Proceedings of MIDAS 2020 (Paperback, 1st ed. 2021): T.P. Singh, Ravi... Data Driven Approach Towards Disruptive Technologies - Proceedings of MIDAS 2020 (Paperback, 1st ed. 2021)
T.P. Singh, Ravi Tomar, Tanupriya Choudhury, Thinagaran Perumal, Hussain Falih Mahdi
R8,159 Discovery Miles 81 590 Ships in 10 - 15 working days

This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, India, during 4-5 September 2020. The book addresses the algorithmic aspect of machine intelligence which includes the framework and optimization of various states of algorithms. Variety of papers related to wide applications in various fields like data-driven industrial IoT, bioinformatics, network and security, autonomous computing and various other aligned areas. The book concludes with interdisciplinary applications like legal, health care, smart society, cyber-physical system and smart agriculture. All papers have been carefully reviewed. The book is of interest to computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.

Blockchain Technology and Innovations in Business Processes (Paperback, 1st ed. 2021): Srikanta Patnaik, Tao-Sheng Wang, Tao... Blockchain Technology and Innovations in Business Processes (Paperback, 1st ed. 2021)
Srikanta Patnaik, Tao-Sheng Wang, Tao Shen, Sushanta Kumar Panigrahi
R4,935 Discovery Miles 49 350 Ships in 10 - 15 working days

This edited book provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness. The book presents original unpublished research papers on blockchain technology and business management on novel architectures, prototypes and case studies.

International Conference on Communication, Computing and Electronics Systems - Proceedings of ICCCES 2020 (Paperback, 1st ed.... International Conference on Communication, Computing and Electronics Systems - Proceedings of ICCCES 2020 (Paperback, 1st ed. 2021)
V. Bindhu, Joao Manuel R.S. Tavares, Alexandros-Apostolos A. Boulogeorgos, Chandrasekar Vuppalapati
R7,510 Discovery Miles 75 100 Ships in 10 - 15 working days

This book includes high-quality papers presented at the International Conference on Communication, Computing and Electronics Systems 2020, held at the PPG Institute of Technology, Coimbatore, India, on 21-22 October 2020. The book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics.

Understanding the Digital World - What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition... Understanding the Digital World - What You Need to Know about Computers, the Internet, Privacy, and Security, Second Edition (Paperback)
Brian W. Kernighan
R761 Discovery Miles 7 610 Ships in 12 - 17 working days

A brand-new edition of the popular introductory textbook that explores how computer hardware, software, and networks work Computers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more about us than we should be comfortable with. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world? In this updated edition of Understanding the Digital World, Brian Kernighan explains how computer hardware, software, and networks work. Topics include how computers are built and how they compute; what programming is; how the Internet and web operate; and how all of these affect security, privacy, property, and other important social, political, and economic issues. Kernighan touches on fundamental ideas from computer science and some of the inherent limitations of computers, and new sections in the book explore Python programming, big data, machine learning, and much more. Numerous color illustrations, notes on sources for further exploration, and a glossary explaining technical terms and buzzwords are included. Understanding the Digital World is a must-read for readers of all backgrounds who want to know more about computers and communications.

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Paperback)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R1,228 Discovery Miles 12 280 Ships in 12 - 17 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

Routledge Handbook of International Cybersecurity (Paperback): Eneken Tikk, Mika Kerttunen Routledge Handbook of International Cybersecurity (Paperback)
Eneken Tikk, Mika Kerttunen
R1,352 Discovery Miles 13 520 Ships in 12 - 17 working days

The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. The volume is split into four thematic sections: Concepts and frameworks; Challenges to secure and peaceful cyberspace; National and regional perspectives on cybersecurity; Global approaches to cybersecurity. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general. Chapter 30 of this book is freely available as a downloadable Open Access PDF under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license at https://www.routledge.com/Routledge-Handbook-of-International-Cybersecurity/Tikk-Kerttunen/p/book/9781138489011

Trends in Wireless Communication and Information Security - Proceedings of EWCIS 2020 (Paperback, 1st ed. 2021): Mithun... Trends in Wireless Communication and Information Security - Proceedings of EWCIS 2020 (Paperback, 1st ed. 2021)
Mithun Chakraborty, Raman Kr. Jha, Valentina Emilia Balas, Samarendra Nath Sur, Debdatta Kandar
R8,107 Discovery Miles 81 070 Ships in 10 - 15 working days

This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India. The book includes papers in the research area of wireless communications and intelligent systems, signal and image processing in engineering applications, data communication and information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from industry.

Blockchain Technology for IoT Applications (Paperback, 1st ed. 2021): Seok-Won Lee, Irish Singh, Masoud Mohammadian Blockchain Technology for IoT Applications (Paperback, 1st ed. 2021)
Seok-Won Lee, Irish Singh, Masoud Mohammadian
R3,245 Discovery Miles 32 450 Ships in 10 - 15 working days

This book explores recent advances in the Internet of things (IoT) via advanced technologies and provides an overview of most aspects which are relevant for advance secure, distributed, decentralized blockchain technology in the Internet of things, their applications, and industry IoT. The book provides an in-depth analysis of the step-by-step evolution of IoT to create a change by enhancing the productivity of industries. It introduces how connected things, data, and their communication (data sharing) environment build a transparent, reliable, secure environment for people, processes, systems, and services with the help of blockchain technology.

Challenging Online Propaganda and Disinformation in the 21st Century (Paperback, 1st ed. 2021): Milos Gregor, Petra Mlejnkova Challenging Online Propaganda and Disinformation in the 21st Century (Paperback, 1st ed. 2021)
Milos Gregor, Petra Mlejnkova
R3,496 Discovery Miles 34 960 Ships in 10 - 15 working days

Disinformation has recently become a salient issue, not just for researchers but for the media, politicians, and the general public as well. Changing circumstances are a challenge for system and societal resilience; disinformation is also a challenge for governments, civil society, and individuals. Thus, this book focuses on the post-truth era and the online environment, which has changed both the ways and forms in which disinformation is presented and spread. The volume is dedicated to the complex processes of understanding the mechanisms and effects of online propaganda and disinformation, its detection and reactions to it in the European context. It focuses on questions and dilemmas from political science, security studies, IT, and law disciplines with the aim to protect society and build resilience against online propaganda and disinformation in the post-truth era.

Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia,... Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Michael Friedewald, Stefan Schiffner, Stephan Krenn
R1,263 Discovery Miles 12 630 Ships in 12 - 17 working days

This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.

Principles of Information Security (Hardcover): Liam Lewis Principles of Information Security (Hardcover)
Liam Lewis
R3,427 R3,008 Discovery Miles 30 080 Save R419 (12%) Ships in 10 - 15 working days
Modern Industrial IoT, Big Data and Supply Chain - Proceedings of the IIoTBDSC 2020 (Paperback, 1st ed. 2021): Victor Chang,... Modern Industrial IoT, Big Data and Supply Chain - Proceedings of the IIoTBDSC 2020 (Paperback, 1st ed. 2021)
Victor Chang, Muthu Ramachandran, Victor Mendez Munoz
R6,920 Discovery Miles 69 200 Ships in 10 - 15 working days

This book is a collection of selected papers presented at the First International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), held as an online conference due to COVID-19 (initially to be held in Macao, Special Administration Region (SAR) of China), during September 15-17, 2020. It includes novel and innovative work from experts, practitioners, scientists and decision-makers from academia and industry. It brings multi-disciplines together on IIoT, data science, cloud computing, software engineering approaches to design, development, testing and quality of products and services.

Information Science and Applications - Proceedings of ICISA 2020 (Paperback, 1st ed. 2021): Hyuncheol Kim, Kuinam J. Kim,... Information Science and Applications - Proceedings of ICISA 2020 (Paperback, 1st ed. 2021)
Hyuncheol Kim, Kuinam J. Kim, Suhyun Park
R4,262 Discovery Miles 42 620 Ships in 10 - 15 working days

This book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Paperback, 1st ed. 2021): Matthew Ryan Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Paperback, 1st ed. 2021)
Matthew Ryan
R4,912 Discovery Miles 49 120 Ships in 10 - 15 working days

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,284 Discovery Miles 82 840
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,029 R854 Discovery Miles 8 540
CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,221 Discovery Miles 12 210
Advancements in Security and Privacy…
Ashwani Kumar, Seelam Sai Satyanarayana Reddy Hardcover R6,253 Discovery Miles 62 530
Modern Principles, Practices, and…
Brij B. Gupta Hardcover R5,612 Discovery Miles 56 120
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,276 Discovery Miles 12 760
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,616 Discovery Miles 56 160
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560

 

Partners