0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (240)
  • R250 - R500 (547)
  • R500+ (5,241)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

IC-BCT 2019 - Proceedings of the International Conference on Blockchain Technology (Paperback, 1st ed. 2020): Dhiren, Patel,... IC-BCT 2019 - Proceedings of the International Conference on Blockchain Technology (Paperback, 1st ed. 2020)
Dhiren, Patel, Sukumar Nandi, B.K Mishra, Deven Shah, Chirag N. Modi, …
R3,279 Discovery Miles 32 790 Ships in 10 - 15 working days

This book presents articles from the International Conference on Blockchain Technology (IC-BCT) 2019, held in Mumbai, India, and highlights recent advances in the field. It brings together researchers and industry practitioners to show case their ideas linked to business case studies, and provides an opportunity for engineers, researchers, startups and professionals in the field of Blockchain technology to further collaboration.

Evolutionary Computing and Mobile Sustainable Networks - Proceedings of ICECMSN 2020 (Paperback, 1st ed. 2021): V. Suma,... Evolutionary Computing and Mobile Sustainable Networks - Proceedings of ICECMSN 2020 (Paperback, 1st ed. 2021)
V. Suma, Noureddine Bouhmala, Haoxiang Wang
R6,093 Discovery Miles 60 930 Ships in 10 - 15 working days

This book features selected research papers presented at the International Conference on Evolutionary Computing and Mobile Sustainable Networks (ICECMSN 2020), held at the Sir M. Visvesvaraya Institute of Technology on 20-21 February 2020. Discussing advances in evolutionary computing technologies, including swarm intelligence algorithms and other evolutionary algorithm paradigms which are emerging as widely accepted descriptors for mobile sustainable networks virtualization, optimization and automation, this book is a valuable resource for researchers in the field of evolutionary computing and mobile sustainable networks.

Cyber Security and Policy - A substantive dialogue (Paperback): Andrew Colarik, Anuradha Mathrani, Julian Jang-Jaccard Cyber Security and Policy - A substantive dialogue (Paperback)
Andrew Colarik, Anuradha Mathrani, Julian Jang-Jaccard
R1,054 R786 Discovery Miles 7 860 Save R268 (25%) Ships in 12 - 19 working days

Welcome to cyberspace - where all your computing and connection needs are on demand, and where security threats have never been more massive.A world without the advantages and convenience provided by cyberspace and the internet of things is now unimaginable. But do we truly grasp the threats to this massive, interconnected system? And do we really understand how to secure it? After all, cyber security is no longer just a technology problem; the effort to secure systems and society are now one and the same.This book discusses cyber security and cyber policy in an effort to improve the use and acceptance of security services. It argues that a substantive dialogue around cyberspace, cyber security and cyber policy is critical to a better understanding of the serious security issues we face.

Security of Cyber-Physical Systems - Vulnerability and Impact (Paperback, 1st ed. 2020): Hadis Karimipour, Pirathayini... Security of Cyber-Physical Systems - Vulnerability and Impact (Paperback, 1st ed. 2020)
Hadis Karimipour, Pirathayini Srikantha, Hany Farag, Jin Wei-Kocsis
R5,362 Discovery Miles 53 620 Ships in 10 - 15 working days

This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today's technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.

Advances in Wireless Communications and Applications - Wireless Technology: Intelligent Network Technologies, Smart Services... Advances in Wireless Communications and Applications - Wireless Technology: Intelligent Network Technologies, Smart Services and Applications, Proceedings of 3rd ICWCA 2019 (Paperback, 1st ed. 2021)
Roumen Kountchev, Aniket Mahanti, Shen Chong, Srikanta Patnaik, Margarita Favorskaya
R4,558 Discovery Miles 45 580 Ships in 10 - 15 working days

This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.

Advances in Communication, Devices and Networking - Proceedings of ICCDN 2019 (Paperback, 1st ed. 2020): Rabindranath Bera,... Advances in Communication, Devices and Networking - Proceedings of ICCDN 2019 (Paperback, 1st ed. 2020)
Rabindranath Bera, Prashant Chandra Pradhan, Chuan-Ming Liu, Sourav Dhar, Samarendra Nath Sur
R5,943 Discovery Miles 59 430 Ships in 10 - 15 working days

This book covers recent trends in the field of devices, wireless communication and networking. It gathers selected papers presented at the International Conference on Communication, Devices and Networking (ICCDN 2019), which was organized by the Department of Electronics and Communication Engineering, Sikkim Manipal Institute of Technology, Sikkim, India, on 9-10 December 2019. Gathering cutting-edge research papers prepared by researchers, engineers and industry professionals, it will help young and experienced scientists and developers alike to explore new perspectives, and offer them inspirations on how to address real-world problems in the areas of electronics, communication, devices and networking.

Social Network Analysis and Law Enforcement - Applications for Intelligence Analysis (Paperback, 1st ed. 2020): Morgan Burcher Social Network Analysis and Law Enforcement - Applications for Intelligence Analysis (Paperback, 1st ed. 2020)
Morgan Burcher
R3,736 Discovery Miles 37 360 Ships in 10 - 15 working days

This book examines the use of social network analysis (SNA) in operational environments from the perspective of those who actually apply it. A rapidly growing body of literature suggests that SNA can reveal significant insights into the overall structure of criminal networks as well as the position of critical actors within such groups. This book draws on the existing SNA and intelligence literature, as well as qualitative interviews with crime intelligence analysts from two Australian state law enforcement agencies to understand its use by law enforcement agencies and the extent to which it can be used in practice. It includes a discussion of the challenges that analysts face when attempting to apply various network analysis techniques to criminal networks. Overall, it advances SNA as an investigative tool, and provides a significant contribution to the field that will be of interest to both researchers and practitioners interested in social network analysis, intelligence analysis and law enforcement.

Architectural Wireless Networks Solutions and Security Issues (Paperback, 1st ed. 2021): Santosh Kumar Das, Sourav Samanta,... Architectural Wireless Networks Solutions and Security Issues (Paperback, 1st ed. 2021)
Santosh Kumar Das, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, Aboul Ella Hassanien
R5,366 Discovery Miles 53 660 Ships in 10 - 15 working days

This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.

Reversible Steganography and Authentication via Transform Encoding (Paperback, 1st ed. 2020): Jyotsna Kumar Mandal Reversible Steganography and Authentication via Transform Encoding (Paperback, 1st ed. 2020)
Jyotsna Kumar Mandal
R4,847 Discovery Miles 48 470 Ships in 10 - 15 working days

This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain. Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganographic processes, the book also explores the adjustment of pixel values after embedding and presents numerical examples of reversible computations. In the context of chaos-based authentication, it also describes testing the quality of generator is using Monobit, Serial and Poker tests. The book then outlines 15 test cases recommended by NIST fifteen test cases, along with their implementation on six evolutionary algorithms for neural cryptographic systems in the context of wireless computations - TPM, KSOMSCT, DHLPSCT, CHDLPSCT, CTHLPSCT and CGTHLPSCT - and verifies their satisfiability based on the implementations of these six techniques. Lastly it presents various metrics of image processing systems. This book is a valuable reference resource for research scholars, PG/UG students and practicing engineers

Cyber Threat Intelligence for the Internet of Things (Paperback, 1st ed. 2020): Elias Bou-Harb, Nataliia Neshenko Cyber Threat Intelligence for the Internet of Things (Paperback, 1st ed. 2020)
Elias Bou-Harb, Nataliia Neshenko
R4,573 Discovery Miles 45 730 Ships in 10 - 15 working days

This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.

Proceedings of Second International Conference on Computing, Communications, and Cyber-Security - IC4S 2020 (Paperback, 1st ed.... Proceedings of Second International Conference on Computing, Communications, and Cyber-Security - IC4S 2020 (Paperback, 1st ed. 2021)
Pradeep Kumar Singh, Slawomir T. Wierzchon, Sudeep Tanwar, Maria Ganzha, Joel J. P. C. Rodrigues
R6,102 Discovery Miles 61 020 Ships in 10 - 15 working days

This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3-4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.

The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020): Joan Daemen, Vincent Rijmen The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020)
Joan Daemen, Vincent Rijmen
R4,833 Discovery Miles 48 330 Ships in 10 - 15 working days

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.

Proceedings of the 9th International Conference on Computer Engineering and Networks (Paperback, 1st ed. 2021): Qi Liu,... Proceedings of the 9th International Conference on Computer Engineering and Networks (Paperback, 1st ed. 2021)
Qi Liu, Xiaodong Liu, Lang Li, Huiyu Zhou, Hui-Huang Zhao
R8,983 Discovery Miles 89 830 Ships in 10 - 15 working days

This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18-20, 2019. It examines innovations in the fields of computer engineering and networking and explores important, state-of-the-art developments in areas such as Information Security, Information Hiding and Cryptography, Cyber Security, and Intelligent Computing and Applications. The book also covers emerging topics in computer engineering and networking, along with their applications, discusses how to improve productivity by using the latest advanced technologies, and examines innovation in the fields of computer engineering and networking, particularly in intelligent computing and security.

Security and Privacy - Select Proceedings of ICSP 2020 (Paperback, 1st ed. 2021): Pantelimon Stanica, Sugata Gangopadhyay,... Security and Privacy - Select Proceedings of ICSP 2020 (Paperback, 1st ed. 2021)
Pantelimon Stanica, Sugata Gangopadhyay, Sumit Kumar Debnath
R2,989 Discovery Miles 29 890 Ships in 10 - 15 working days

This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021,... Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part III (Paperback, 1st ed. 2021)
Xingming Sun, Xiao Rui Zhang, Zhihua Xia, Elisa Bertino
R3,168 Discovery Miles 31 680 Ships in 10 - 15 working days

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021,... Advances in Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I (Paperback, 1st ed. 2021)
Xingming Sun, Xiao Rui Zhang, Zhihua Xia, Elisa Bertino
R3,163 Discovery Miles 31 630 Ships in 10 - 15 working days

The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.

Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Hardcover): Ariel Evans Enterprise Cybersecurity in Digital Business - Building a Cyber Resilient Organization (Hardcover)
Ariel Evans
R4,309 Discovery Miles 43 090 Ships in 12 - 19 working days

Addresses one of the hottest issues facing all businesses today, and one that can destroy companies overnight - cybersecurity. Identifies how to implement cybersecurity strategy and practices in a straightforward way. Demystifies a crucial topic for executives, taking it away from an information technology issue and making it understandable for business leaders and board members with governance oversight. Ideal reading for executives, and also students on the growing number of courses on this topic.

Secrets of a Cyber Security Architect (Hardcover): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Hardcover)
Brook S. E. Schoenfield
R2,020 Discovery Miles 20 200 Ships in 12 - 19 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

Blockchain - Una Guia Esencial Para Principiantes Para Comprender La Tecnologia Blockchain, Criptomonedas, Bitcoin y el Futuro... Blockchain - Una Guia Esencial Para Principiantes Para Comprender La Tecnologia Blockchain, Criptomonedas, Bitcoin y el Futuro del Dinero (Spanish Edition) (Spanish, Hardcover)
Herbert Jones
R750 R658 Discovery Miles 6 580 Save R92 (12%) Ships in 10 - 15 working days
Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Paperback, 1st ed. 2021): Jennifer S.... Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Paperback, 1st ed. 2021)
Jennifer S. Raj, Abdullah M. Iliyasu, Robert Bestak, Zubair A. Baig
R10,199 Discovery Miles 101 990 Ships in 10 - 15 working days

This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.

Intelligent Information Processing X - 11th IFIP TC 12 International Conference, IIP 2020, Hangzhou, China, July 3-6, 2020,... Intelligent Information Processing X - 11th IFIP TC 12 International Conference, IIP 2020, Hangzhou, China, July 3-6, 2020, Proceedings (Paperback, 1st ed. 2020)
Zhongzhi Shi, Sunil Vadera, Elizabeth Chang
R1,611 Discovery Miles 16 110 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2020, held in Hangzhou, China, in July 2020. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. They are organized in topical sections on machine learning; multi-agent system; recommendation system; social computing; brain computer integration; pattern recognition; and computer vision and image understanding.

Cyber Security: Analytics, Technology and Automation (Hardcover, 2015 ed.): Martti Lehto, Pekka Neittaanmaki Cyber Security: Analytics, Technology and Automation (Hardcover, 2015 ed.)
Martti Lehto, Pekka Neittaanmaki
R4,335 Discovery Miles 43 350 Ships in 12 - 19 working days

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

Choose Your InfoSec Path - An Interactive Cybersecurity Adventure for Beginners (Paperback, 1st ed.): Alexander J. Roxon Choose Your InfoSec Path - An Interactive Cybersecurity Adventure for Beginners (Paperback, 1st ed.)
Alexander J. Roxon
R1,601 R1,307 Discovery Miles 13 070 Save R294 (18%) Ships in 10 - 15 working days

Cybersecurity is a pressing issue across industries, as well as increasingly important in people's personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with beginners in mind. Step into the shoes of a Chief Information Security Officer (CISO) and find out what could possibly go wrong during a breach. Author Alexander J. Roxon weaves together essential InfoSec concepts with an exciting and fast-paced storyline to make the lessons relatable and easy to understand. Determine what steps your character takes next and affect the outcome of your path. Will you emerge from the breach unscathed? With over 50 different endings, you can explore the what-ifs and experience a new path each time. A supporting glossary makes this book a resource you can return to long after your story is completed. Crucially, the integrity of the cybersecurity concepts is maintained and all events are genuinely plausible from a technical perspective. The book includes commentary to examine key concepts and reflect on decisions. This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. Learn some of the basics of incident response, how to dampen the effects of a breach, and get the jump on the bad guys. Your journey starts now. What You'll Learn Understand some of the basic concepts of incident response. Experience how a real-life incident can go from zero to chaos very rapidly. Find out how being proactive can significantly improve how information security breaches play out. Discover how to dampen the effects of a breach. Who This Book Is For This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. People who like to laugh as well as learn.

Wireless Crime and Forensic Investigation (Paperback): Gregory Kipper Wireless Crime and Forensic Investigation (Paperback)
Gregory Kipper
R1,928 Discovery Miles 19 280 Ships in 12 - 19 working days

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand on its own, making researching wireless technologies, security, crime, or forensics easy. With a problem space as big and complex as wireless, proactive measures must be put in place, and put in place immediately. To protect your organization, you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology, but also provides the information required for conducting a forensic analysis in a wireless environment.

Mobile Multimedia Communications - 14th EAI International Conference, Mobimedia 2021, Virtual Event, July 23-25, 2021,... Mobile Multimedia Communications - 14th EAI International Conference, Mobimedia 2021, Virtual Event, July 23-25, 2021, Proceedings (Paperback, 1st ed. 2021)
Jinbo Xiong, Shaoen Wu, Changgen Peng, Youliang Tian
R3,986 Discovery Miles 39 860 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Mobile Multimedia Communications, Mobimedia 2021, held in July 2021. Due to COVID-19 pandemic the conference was held virtually. The 66 revised full papers presented were carefully selected from 166 submissions. The papers are organized in topical sections as follows: Internet of Things and Wireless Communications Communication; Strategy Optimization and Task Scheduling Oral Presentations; Privacy Computing Technology; Cyberspace Security and Access control; Neural Networks and Feature Learning Task Classification and Prediction; Object Recognition and Detection.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Environmental Perception Technology for…
Xin Bi Hardcover R3,043 Discovery Miles 30 430
Healing For Trauma - In The South…
Yvonne Retief Paperback R199 R183 Discovery Miles 1 830
Algorithms for Sparsity-Constrained…
Sohail Bahmani Hardcover R4,907 Discovery Miles 49 070
Stuff We Wish We Knew Before Getting…
Mo Grootboom, Phindi Grootboom Paperback R330 R309 Discovery Miles 3 090
The Unresolved National Question - Left…
Edward Webster, Karin Pampallis Paperback  (2)
R395 R365 Discovery Miles 3 650
Stellenbosch: Murder Town - Two Decades…
Julian Jansen Paperback R360 R337 Discovery Miles 3 370
Falling Monuments, Reluctant Ruins - The…
Hilton Judin Paperback R395 R365 Discovery Miles 3 650
My Only Story - The Hunt For A Serial…
Deon Wiggett Paperback R376 Discovery Miles 3 760
Best Men of the Bar - The Early Years of…
John Austin Matzko Hardcover R2,549 Discovery Miles 25 490
New Directions in Thin Film…
Sreekanth K. V., Mohamed ElKabbash, … Hardcover R3,020 Discovery Miles 30 200

 

Partners