0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (240)
  • R250 - R500 (548)
  • R500+ (5,240)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity... The Cybersecurity Body of Knowledge - The ACM/IEEE/AIS/IFIP Recommendations for a Complete Curriculum in Cybersecurity (Paperback)
Daniel Shoemaker, Anne Kohnke, Ken Sigler
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne's research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken's research is in the areas of software management, software assurance, and cybersecurity.

Beyond Cybersecurity - Protecting Your Digital Business (Hardcover): J. Kaplan Beyond Cybersecurity - Protecting Your Digital Business (Hardcover)
J. Kaplan
R1,019 R869 Discovery Miles 8 690 Save R150 (15%) Ships in 10 - 15 working days

Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprietary research, client experience, and interviews with over 200 executives, regulators, and security experts, offering you a well-rounded, thoroughly researched resource that presents its findings in an organized, approachable style. Members of the global economy have spent years and tens of billions of dollars fighting cyber threats but attacks remain an immense concern in the world of online business. The threat of data compromise that can lead to the leak of important financial and personal details can make consumers suspicious of the digital economy, and cause a nosedive in their trust and confidence in online business models. * Understand the critical issue of cyber-attacks, and how they are both a social and a business issue that could slow the pace of innovation while wreaking financial havoc * Consider how step-change capability improvements can create more resilient organizations * Discuss how increased collaboration within the cybersecurity industry could improve alignment on a broad range of policy issues * Explore how the active engagement of top-level business and public leaders can achieve progress toward cyber-resiliency Beyond Cybersecurity: Protecting Your Digital Business is an essential resource for business leaders who want to protect their organizations against cyber-attacks.

Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Paperback, 1st ed. 2020):... Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Paperback, 1st ed. 2020)
Peter Christen, Thilina Ranbaduge, Rainer Schnell
R4,892 Discovery Miles 48 920 Ships in 10 - 15 working days

This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and their computational aspects, practical considerations such as dealing with dirty and missing data, as well as privacy, risk, and performance assessment measures. Existing techniques for privacy-preserving record linkage are evaluated empirically and real-world application examples that scale to population sizes are described. The book also includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic data that can be used to test and evaluate linkage techniques. This book consists of fourteen chapters grouped into four parts, and two appendices. The first part introduces the reader to the topic of linking sensitive data, the second part covers methods and techniques to link such data, the third part discusses aspects of practical importance, and the fourth part provides an outlook of future challenges and open research problems relevant to linking sensitive databases. The appendices provide pointers and describe freely available, open-source software systems that allow the linkage of sensitive data, and provide further details about the evaluations presented. A companion Web site at https://dmm.anu.edu.au/lsdbook2020 provides additional material and Python programs used in the book. This book is mainly written for applied scientists, researchers, and advanced practitioners in governments, industry, and universities who are concerned with developing, implementing, and deploying systems and tools to share sensitive information in administrative, commercial, or medical databases. The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!David J. Hand, Imperial College, London

Ciberseguridad - Una Simple Guia para Principiantes sobre Ciberseguridad, Redes Informaticas y Como Protegerse del Hacking en... Ciberseguridad - Una Simple Guia para Principiantes sobre Ciberseguridad, Redes Informaticas y Como Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingenieria Social (Spanish, Hardcover)
Quinn Kiser
R765 R673 Discovery Miles 6 730 Save R92 (12%) Ships in 10 - 15 working days
Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Hardcover): Ilker OEzcelik, Richard Brooks Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Hardcover)
Ilker OEzcelik, Richard Brooks
R3,980 Discovery Miles 39 800 Ships in 12 - 17 working days

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia,... Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Michael Friedewald, Stefan Schiffner, Stephan Krenn
R1,393 Discovery Miles 13 930 Ships in 12 - 17 working days

This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.

Human-Centric Computing in a Data-Driven Society - 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14... Human-Centric Computing in a Data-Driven Society - 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, Tokyo, Japan, September 9-11, 2020, Proceedings (Paperback, 1st ed. 2020)
David Kreps, Taro Komukai, T. V. Gopal, Kaori Ishii
R4,354 Discovery Miles 43 540 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, which was supposed take place in Tokyo, Japan, in September 2020, but the conference was cancelled due to the COVID-19 crisis.The 31 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers deal with the constantly evolving intimate relationship between humans and technology. They are organized in the following sections: ethical and legal considerations in a data-driven society; the data-driven society; peace and war; our digital lives; individuals in data-driven society; and gender, diversity and ICT.

Introduction to Biometrics (Paperback, 2011 ed.): Anil K. Jain, Arun A. Ross, Karthik Nandakumar Introduction to Biometrics (Paperback, 2011 ed.)
Anil K. Jain, Arun A. Ross, Karthik Nandakumar
R1,800 R1,684 Discovery Miles 16 840 Save R116 (6%) Ships in 12 - 17 working days

Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one's computer to gaining entry into a country. While the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students. The three commonly used modalities in the biometrics field, namely, fingerprint, face, and iris are covered in detail in this book. Few other modalities like hand geometry, ear, and gait are also discussed briefly along with advanced topics such as multibiometric systems and security of biometric systems. Exercises for each chapter will be available on the book website to help students gain a better understanding of the topics and obtain practical experience in designing computer programs for biometric applications. These can be found at: http://www.csee.wvu.edu/~ross/BiometricsTextBook/. Designed for undergraduate and graduate students in computer science and electrical engineering, "Introduction to Biometrics" is also suitable for researchers and biometric and computer security professionals.

A Technical Guide to IPSec Virtual Private Networks (Paperback): James S. Tiller A Technical Guide to IPSec Virtual Private Networks (Paperback)
James S. Tiller
R3,137 Discovery Miles 31 370 Ships in 12 - 17 working days

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become.
A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security.
Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies.
After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

Cybersecurity Public Policy - SWOT Analysis Conducted on 43 Countries (Hardcover): Bradley Fowler, Kennedy Maranga Cybersecurity Public Policy - SWOT Analysis Conducted on 43 Countries (Hardcover)
Bradley Fowler, Kennedy Maranga
R3,798 Discovery Miles 37 980 Ships in 12 - 17 working days

* Educates the public and private sectors on the value of cybersecurity public policy. * Assesses current cybersecurity public policy to convey the strengths, weaknesses, opportunities, and threats engulfed in each cybersecurity public policy developed and relied upon by 43 countries. * Introduces resolution to current issues enveloping in cybersecurity public policy relied upon by 43 countries. * Provides a database of research that educates and empowers public and private sector on cybersecurity public policy.

Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Paperback, 1st ed. 2021): Debahuti Mishra, Rajkumar... Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Paperback, 1st ed. 2021)
Debahuti Mishra, Rajkumar Buyya, Prasant Mohapatra, Srikanta Patnaik
R6,047 Discovery Miles 60 470 Ships in 10 - 15 working days

This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.

Data Mining and Big Data - 6th International Conference, DMBD 2021, Guangzhou, China, October 20-22, 2021, Proceedings, Part II... Data Mining and Big Data - 6th International Conference, DMBD 2021, Guangzhou, China, October 20-22, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Ying Tan, Yuhui Shi, Albert Zomaya, Hongyang Yan, Jun Cai
R3,090 Discovery Miles 30 900 Ships in 10 - 15 working days

This two-volume set, CCIS 1453 and CCIS 1454, constitutes refereed proceedings of the 6th International Conference on Data Mining and Big Data, DMBD 2021, held in Guangzhou, China, in October 2021. The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on advantages in theories, technologies, and applications in data mining and big data. The volume covers many aspects of data mining and big data as well as intelligent computing methods applied to all fields of computer science, machine learning, data mining and knowledge discovery, data science, etc.

Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor,... Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings (Paperback, 1st ed. 2020)
Lynette Drevin, Sune Von Solms, Marianthi Theocharidou
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.

Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised... Advances in Digital Forensics XVI - 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Gilbert Peterson, Sujeet Shenoi
R3,031 Discovery Miles 30 310 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, filesystem forensics, cloud forensics, social media forensics, multimedia forensics, and novel applications. This book is the sixteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of sixteen edited papers from the Sixteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India, in the winter of 2020. Advances in Digital Forensics XVI is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September... ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Paperback, 1st ed. 2020)
Marko Hoelbl, Kai Rannenberg, Tatjana Welzer
R3,590 Discovery Miles 35 900 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.

Advances in Wireless Communications and Applications - Smart Communications: Interactive Methods and Intelligent Algorithms,... Advances in Wireless Communications and Applications - Smart Communications: Interactive Methods and Intelligent Algorithms, Proceedings of 3rd ICWCA 2019 (Paperback, 1st ed. 2021)
Roumen Kountchev, Aniket Mahanti, Shen Chong, Srikanta Patnaik, Margarita Favorskaya
R4,563 Discovery Miles 45 630 Ships in 10 - 15 working days

This book features selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. Focusing on applications of the latest smart theories and approaches, and recent advances in the field, it covers topics such as OFDM and multi-carrier techniques; smart antenna and space-time signal processing; MIMO, multi-user MIMO, and massive MIMO; modulation, coding, and diversity techniques; dynamic spectrum access and cognitive radio; interference management and radio resource allocation; equalization techniques; synchronization, estimation, and detection techniques; and wireless multiple access (e.g. CDMA, OFDMA, NOMA, ).

CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide (Paperback, Ed): Graham Thompson CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide (Paperback, Ed)
Graham Thompson
R893 Discovery Miles 8 930 Ships in 12 - 17 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effective study guide provides 100% coverage of every topic on the challenging CCSK exam from the Cloud Security AllianceThis integrated self-study system enables you to take the current edition of the Cloud Security Alliance's Certificate of Cloud Security Knowledge (CCSK) exam with confidence. Written by CSA-authorized trainer Graham Thompson in collaboration with the Cloud Security Alliance, the book offers exam-focused coverage of the latest cloud technologies, including virtualization, governance, and security. Beyond exam preparation, the book also serves as a valuable on-the-job reference. To aid in learning, CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide features exam tips that highlight key information, chapter summaries that serves as quick reviews of salient points, and practice questions that allow readers to test their comprehension. All questions closely match those on the live test in tone, format, and content. "Notes," "Tips," and "Cautions" throughout provide real-world insight and call out potentially harmful situations. * Features real-world examples, case studies, and best practices drawn from author's experience * Online content includes access to 200 additional practice questions in the TotalTester online exam engine * Includes 10% discount voucher coupon for the CCSK exam, a $39 value

Deep Biometrics (Paperback, 1st ed. 2020): Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger Deep Biometrics (Paperback, 1st ed. 2020)
Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
R3,807 Discovery Miles 38 070 Ships in 10 - 15 working days

This book highlights new advances in biometrics using deep learning toward deeper and wider background, deeming it "Deep Biometrics". The book aims to highlight recent developments in biometrics using semi-supervised and unsupervised methods such as Deep Neural Networks, Deep Stacked Autoencoder, Convolutional Neural Networks, Generative Adversary Networks, and so on. The contributors demonstrate the power of deep learning techniques in the emerging new areas such as privacy and security issues, cancellable biometrics, soft biometrics, smart cities, big biometric data, biometric banking, medical biometrics, healthcare biometrics, and biometric genetics, etc. The goal of this volume is to summarize the recent advances in using Deep Learning in the area of biometric security and privacy toward deeper and wider applications. Highlights the impact of deep learning over the field of biometrics in a wide area; Exploits the deeper and wider background of biometrics, such as privacy versus security, biometric big data, biometric genetics, and biometric diagnosis, etc.; Introduces new biometric applications such as biometric banking, internet of things, cloud computing, and medical biometrics.

21st Century Prometheus - Managing CBRN Safety and Security Affected by Cutting-Edge Technologies (Paperback, 1st ed. 2020):... 21st Century Prometheus - Managing CBRN Safety and Security Affected by Cutting-Edge Technologies (Paperback, 1st ed. 2020)
Maurizio Martellini, Ralf Trapp
R3,565 Discovery Miles 35 650 Ships in 10 - 15 working days

This book describes the evolving CBRN risk landscape and highlights advances in the "core" CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks, challenging certain assumptions that underlie current control regimes. The book also shows how technologies can be enablers for more effective strategies to mitigate these risks. 21st-century safety and security risks emanating from chemical, biological, radiological and nuclear materials - whether resulting from natural events, accidents or malevolent use - are increasingly shaped by technologies that enable their development, production or use in ways that differ from the past. Artificial intelligence, the use of cyberspace, the revolution in the life sciences, new manufacturing methods, new platforms and equipment for agent delivery, hypersonic weapons systems, information tools utilised in hybrid warfare - these and other technologies are reshaping the global security environment and CBRN landscape. They are leading to a growing potential for highly targeted violence, and they can lead to greater instability and vulnerability worldwide. At the same time, technology offers solutions to manage CBRN risks. Examples are faster detection, more accurate characterisation of the nature and origin of CBRN agents, new forensic investigation methods, or new medical treatments for victims of CBRN incidents. New educational concepts help to foster a culture of responsibility in science and technology and strengthen governance. New training methods help develop practical skills to manage CBRN risks more effectively. The book concludes that there is a growing need for a holistic framework towards CBRN risk mitigation. Traditional arms control mechanisms such as global, regional or bilateral treaties and export controls are still needed, as they provide a necessary legal and institutional framework. But laws and technology denial alone will not suffice, and institutional mechanisms can at times be weak. Given the pace of technological progress and the diffusion of critical knowledge, tools and materials, policymakers must accept that CBRN risks cannot be eliminated altogether. Instead, society has to learn to manage these risks and develop resilience against them. This requires a "softer", broadly based multi-stakeholder approach involving governments, industry, the research and development communities, educators, and civil society. Furthermore, educating policymakers that cutting-edge technologies may seriously affect global strategic stability could create incentives for developing a more creative and contemporary arms control strategy that fosters cooperation rather than incremental polarisation.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Paperback, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Paperback, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R6,077 Discovery Miles 60 770 Ships in 10 - 15 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings (Paperback, 1st ed. 2020)
Nathan Clarke, Steven Furnell
R1,623 Discovery Miles 16 230 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Localization in Underwater Sensor Networks (Hardcover, 1st ed. 2021): Jing Yan, Haiyan Zhao, Yuan Meng, Xinping Guan Localization in Underwater Sensor Networks (Hardcover, 1st ed. 2021)
Jing Yan, Haiyan Zhao, Yuan Meng, Xinping Guan
R3,819 Discovery Miles 38 190 Ships in 12 - 17 working days

Ocean covers 70.8% of the Earth's surface, and it plays an important role in supporting all life on Earth. Nonetheless, more than 80% of the ocean's volume remains unmapped, unobserved and unexplored. In this regard, Underwater Sensor Networks (USNs), which offer ubiquitous computation, efficient communication and reliable control, are emerging as a promising solution to understand and explore the ocean. In order to support the application of USNs, accurate position information from sensor nodes is required to correctly analyze and interpret the data sampled. However, the openness and weak communication characteristics of USNs make underwater localization much more challenging in comparison to terrestrial sensor networks. In this book, we focus on the localization problem in USNs, taking into account the unique characteristics of the underwater environment. This problem is of considerable importance, since fundamental guidance on the design and analysis of USN localization is very limited at present. To this end, we first introduce the network architecture of USNs and briefly review previous approaches to the localization of USNs. Then, the asynchronous clock, node mobility, stratification effect, privacy preserving and attack detection are considered respectively and corresponding localization schemes are developed. Lastly, the book's rich implications provide guidance on the design of future USN localization schemes. The results in this book reveal from a system perspective that underwater localization accuracy is closely related to the communication protocol and optimization estimator. Researchers, scientists and engineers in the field of USNs can benefit greatly from this book, which provides a wealth of information, useful methods and practical algorithms to help understand and explore the ocean.

Data Science and Security - Proceedings of IDSCS 2020 (Paperback, 1st ed. 2021): Dharm Singh Jat, Samiksha Shukla, Aynur Unal,... Data Science and Security - Proceedings of IDSCS 2020 (Paperback, 1st ed. 2021)
Dharm Singh Jat, Samiksha Shukla, Aynur Unal, Durgesh Kumar Mishra
R4,588 Discovery Miles 45 880 Ships in 10 - 15 working days

This book presents best selected papers presented at the International Conference on Data Science for Computational Security (IDSCS 2020), organized by the Department of Data Science, CHRIST (Deemed to be University), Pune Lavasa Campus, India, during 13-14 March 2020. The proceeding will be targeting the current research works in the areas of data science, data security, data analytics, artificial intelligence, machine learning, computer vision, algorithms design, computer networking, data mining, big data, text mining, knowledge representation, soft computing and cloud computing.

Digitalisation and Human Security - A Multi-Disciplinary Approach to Cybersecurity in the European High North (Paperback, 1st... Digitalisation and Human Security - A Multi-Disciplinary Approach to Cybersecurity in the European High North (Paperback, 1st ed. 2020)
Mirva Salminen, Gerald Zojer, Kamrul Hossain
R4,584 Discovery Miles 45 840 Ships in 10 - 15 working days

This book constructs a multidisciplinary approach to human security questions related to digitalisation in the European High North i.e. the northernmost areas of Scandinavia, Finland and North-Western Russia. It challenges the mainstream conceptualisation of cybersecurity and reconstructs it with the human being as the referent object of security.

Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 2 (Paperback, 1st ed. 2021): Debahuti Mishra, Rajkumar... Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 2 (Paperback, 1st ed. 2021)
Debahuti Mishra, Rajkumar Buyya, Prasant Mohapatra, Srikanta Patnaik
R4,701 Discovery Miles 47 010 Ships in 10 - 15 working days

This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,388 Discovery Miles 13 880
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R695 Discovery Miles 6 950
Online Predators, an Internet Insurgency…
Jeffrey A. Lee Paperback R637 Discovery Miles 6 370
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R9,061 Discovery Miles 90 610
Two-Factor Authentication
Mark Stanislav Paperback R543 Discovery Miles 5 430
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,290 Discovery Miles 12 900
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R7,074 Discovery Miles 70 740
PCI Dss: A Pocket Guide
IT Governance Paperback R425 Discovery Miles 4 250
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,766 Discovery Miles 67 660
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,848 Discovery Miles 88 480

 

Partners