Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking > Network security
This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today's technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.
This book presents articles from the International Conference on Blockchain Technology (IC-BCT) 2019, held in Mumbai, India, and highlights recent advances in the field. It brings together researchers and industry practitioners to show case their ideas linked to business case studies, and provides an opportunity for engineers, researchers, startups and professionals in the field of Blockchain technology to further collaboration.
Cybersecurity is a pressing issue across industries, as well as increasingly important in people's personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with beginners in mind. Step into the shoes of a Chief Information Security Officer (CISO) and find out what could possibly go wrong during a breach. Author Alexander J. Roxon weaves together essential InfoSec concepts with an exciting and fast-paced storyline to make the lessons relatable and easy to understand. Determine what steps your character takes next and affect the outcome of your path. Will you emerge from the breach unscathed? With over 50 different endings, you can explore the what-ifs and experience a new path each time. A supporting glossary makes this book a resource you can return to long after your story is completed. Crucially, the integrity of the cybersecurity concepts is maintained and all events are genuinely plausible from a technical perspective. The book includes commentary to examine key concepts and reflect on decisions. This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. Learn some of the basics of incident response, how to dampen the effects of a breach, and get the jump on the bad guys. Your journey starts now. What You'll Learn Understand some of the basic concepts of incident response. Experience how a real-life incident can go from zero to chaos very rapidly. Find out how being proactive can significantly improve how information security breaches play out. Discover how to dampen the effects of a breach. Who This Book Is For This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. People who like to laugh as well as learn.
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.
This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain. Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganographic processes, the book also explores the adjustment of pixel values after embedding and presents numerical examples of reversible computations. In the context of chaos-based authentication, it also describes testing the quality of generator is using Monobit, Serial and Poker tests. The book then outlines 15 test cases recommended by NIST fifteen test cases, along with their implementation on six evolutionary algorithms for neural cryptographic systems in the context of wireless computations - TPM, KSOMSCT, DHLPSCT, CHDLPSCT, CTHLPSCT and CGTHLPSCT - and verifies their satisfiability based on the implementations of these six techniques. Lastly it presents various metrics of image processing systems. This book is a valuable reference resource for research scholars, PG/UG students and practicing engineers
This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18-20, 2019. It examines innovations in the fields of computer engineering and networking and explores important, state-of-the-art developments in areas such as Information Security, Information Hiding and Cryptography, Cyber Security, and Intelligent Computing and Applications. The book also covers emerging topics in computer engineering and networking, along with their applications, discusses how to improve productivity by using the latest advanced technologies, and examines innovation in the fields of computer engineering and networking, particularly in intelligent computing and security.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of things (IoT) and information security.
This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3-4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.
This book constitutes the refereed proceedings of the 11th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2020, held in Hangzhou, China, in July 2020. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. They are organized in topical sections on machine learning; multi-agent system; recommendation system; social computing; brain computer integration; pattern recognition; and computer vision and image understanding.
Earth at Risk in the 21st Century offers critical interdisciplinary reflections on peace, security, gender relations, migration and the environment, all of which are threatened by climate change, with women and children affected most. Deep-rooted gender discrimination is also a result of the destructive exploitation of natural resources and the pollution of soils, water, biota and air. In the Anthropocene, the management of human society and global resources has become unsustainable and has created multiple conflicts by increasing survival threats primarily for poor people in the Global South. Alternative approaches to peace and security, focusing from bottom-up on an engendered peace with sustainability, may help society and the environment to be managed in the highly fragile natural conditions of a 'hothouse Earth'. Thus, the book explores systemic alternatives based on indigenous wisdom, gift economy and the economy of solidarity, in which an alternative cosmovision fosters mutual care between humankind and nature. * Special analysis of risks to the survival of humankind in the 21st century. * Interdisciplinary studies on peace, security, gender and environment related to global environmental and climate change. * Critical reflections on gender relations, peace, security, migration and the environment * Systematic analysis of food, water, health, energy security and its nexus. * Alternative proposals from the Global South with indigenous wisdom for saving Mother Earth.
There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually inserts checks before indirect branches to consult a read-only table which stores the valid CFG information. However, this kind of read-only table can be overwritten by some kinds of attacks (e.g., the Rowhammer attack and data-oriented programming). The third component is to efficiently enforce the CFI policy. In current approaches CFI checks are always executed whenever there is an indirect control flow transfer. Therefore, it is critical to minimize the performance impact of CFI checks. In this book, we propose novel solutions to handle these three fundamental components. To generate a precise CFI policy without the support of the source code, we systematically study two methods which recover CFI policy based on function signature matching at the binary level and propose our novel rule- and heuristic-based mechanism to more accurately recover function signature. To embed CFI policy securely, we design a novel platform which encodes the policy into the machine instructions directly without relying on consulting any read-only data structure, by making use of the idea of instruction-set randomization. Each basic block is encrypted with a key derived from the CFG. To efficiently enforce CFI policy, we make use of a mature dynamic code optimization platform called DynamoRIO to enforce the policy so that we are only required to do the CFI check when needed.
Dieses Buch beinhaltet eine Untersuchung der rechtlichen Rahmenbedingungen von Mobile Health Applications (mHealth-Anwendungen). Im Zuge der Digitalisierung des Gesundheitswesens halten Gesundheits-Apps vermehrt Einzug in die Gesundheitsversorgung. Ihr Einsatz ist fur einen Grossteil der Bevoelkerung ein fester Bestandteil des Alltags geworden. Hersteller, Leistungserbringer aber auch die Patienten selbst stellen dabei grosse Erwartungen an die positiven Versorgungseffekte der Apps. Neue technische Errungenschaften bergen allerdings oftmals auch Risiken und Gefahren, stellen damit rechtliche Herausforderungen dar. Mit Inkrafttreten des Digitale-Versorgung-Gesetzes und unmittelbarer Anwendbarkeit der EU-Medizinprodukteverordnung hat sich ein wesentlicher Teil des fu r mHealth-Anwendungen massgeblichen Regelungsgefu ges grundlegend verandert. Die vorliegende Forschungsarbeit untersucht, inwieweit das Recht Innovationsoffenheit und Innovationsverantwortung in Bezug auf mHealth-Anwendungen in einen gerechten Ausgleich bringen kann. Hierzu werden die einschlagigen Rechtsvorschriften aus dem Medizinprodukterecht, dem Haftungsrecht, dem Datenschutzrecht und dem Sozialversicherungsrecht einer eingehenden Analyse unterzogen und Vorschlage zur Weiterentwicklung des Rechtsrahmens unterbreitet.
This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur's Computer Science and Engineering Department established an 'Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3I Center)' in 2016 with funding from the Science and Engineering Research Board (SERB), and other funding agencies. The work at the center focuses on smart grid security, manufacturing and other industrial control system security; network, web and data security; cryptography, and penetration techniques. The founders are involved with various Indian government agencies including the Reserve Bank of India, National Critical Information Infrastructure Protection Center, UIDAI, CCTNS under home ministry, Ministry of IT and Electronics, and Department of Science & Technology. The center also testifies to the parliamentary standing committee on cyber security, and has been working with the National Cyber Security Coordinator's office in India. Providing glimpses of the work done at IIT Kanpur, and including perspectives from other Indian institutes where work on cyber security is starting to take shape, the book is a valuable resource for researchers and professionals, as well as educationists and policymakers.
"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
This book presents the outcomes of the 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cybercrime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber security intelligence and analytics. Due to COVID-19, Authors, Keynote Speakers and PC committees will attend the conference online.
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-critical assets are compromised: cyberattack, data breach, system outage, pandemic, natural disaster, and many more. Rather than being compliance-concentric, this book focuses on how your business can identify the assets that are most valuable to your organization and the threat vectors associated with these assets. You will learn how to apply appropriate mitigation controls to reduce the risks within suitable tolerances. You will gain a comprehensive understanding of the value that effective protective security provides and how to develop an effective strategy for your type of business. What You Will Learn Take a deep dive into legal and regulatory perspectives and how an effective protective security strategy can help fulfill these ever-changing requirements Know where compliance fits into a company-wide protective security strategy Secure your digital footprint Build effective 5 D network architectures: Defend, detect, delay, disrupt, deter Secure manufacturing environments to balance a minimal impact on productivity Securing your supply chains and the measures needed to ensure that risks are minimized Who This Book Is For Business owners, C-suite, information security practitioners, CISOs, cybersecurity practitioners, risk managers, IT operations managers, IT auditors, and military enthusiasts
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.
This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include: Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate; On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require; Human understanding and control of highly distributed autonomous cyber defenses; Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system. This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment. Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security. This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.
This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms. |
You may like...
Security of Networks and Services in an…
Daphne Tuncer, Robert Koch, …
Hardcover
R1,403
Discovery Miles 14 030
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig
Hardcover
R6,256
Discovery Miles 62 560
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R996
Discovery Miles 9 960
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, …
Hardcover
R8,190
Discovery Miles 81 900
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, …
Hardcover
R2,779
Discovery Miles 27 790
Research Anthology on Business Aspects…
Information Resources Management Association
Hardcover
R12,087
Discovery Miles 120 870
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, …
Hardcover
R6,525
Discovery Miles 65 250
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, …
Hardcover
R6,256
Discovery Miles 62 560
|