0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (595)
  • R500+ (5,134)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Technocrime and Criminological Theory (Hardcover): Kevin Steinmetz, Matt R. Nobles Technocrime and Criminological Theory (Hardcover)
Kevin Steinmetz, Matt R. Nobles
R6,749 Discovery Miles 67 490 Ships in 10 - 15 working days

Cybercrime, computer crime, Internet crime, and technosecurity have been of increasing concern to citizens, corporations, and governments since their emergence in the 1980s. Addressing both the conventional and radical theories underlying this emerging criminological trend, including feminist theory, social learning theory, and postmodernism, this text paves the way for those who seek to tackle the most pertinent areas in technocrime. Technocrime and Criminological Theory challenges readers to confront the conflicts, gaps, and questions faced by both scholars and practitioners in the field. This book serves as an ideal primer for scholars beginning to study technocrime or as a companion for graduate level courses in technocrime or deviance studies.

Security for Service Oriented Architectures (Hardcover): Walter Williams Security for Service Oriented Architectures (Hardcover)
Walter Williams
R5,359 Discovery Miles 53 590 Ships in 10 - 15 working days

Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.

Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover): Ann Butera Mastering the Five Tiers of Audit Competency - The Essence of Effective Auditing (Hardcover)
Ann Butera
R5,764 Discovery Miles 57 640 Ships in 10 - 15 working days

Risk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing practices. Filled with practical do and don't techniques, it encompasses the interpersonal aspects of risk-based auditing, not just the technical content.This book details the behaviors you need to demonstrate and the habitual actions you need to take at each phase in an audit to manage the people relationships as well as the work itself. Each section of this book is devoted to a component of the audit: planning, detailed risk and control assessment, testing, audit report writing, project management, audit team management, and client relationship management.The book leverages The Whole Person Project, Inc.'s 30 years of hands-on organizational development experience and custom-designed internal audit training programs to aid those just starting out in audit as well as more experienced auditors. It also contains templates you can use to set performance goals and assess your progress towards achieving those goals.This book will spark ideas that can enhance performance, improve working relationships, and make it easier to complete audits that improve your organization's risk management culture and practices. Explaining how to make positive and sustained changes to the way you approach your work, the book includes a summary of the key points and a brief quiz to help you remember salient ideas in each chapter.Presenting proven methods and advice that can help you immediately save time, reduce stress, and produce reliable, quality results, this book is an ideal resource for anyone looking to make positive changes and adopt more productive work habits

Healthcare Fraud Investigation Guidebook (Hardcover): Charles E. Piper Healthcare Fraud Investigation Guidebook (Hardcover)
Charles E. Piper
R5,758 Discovery Miles 57 580 Ships in 10 - 15 working days

Some have estimated that healthcare fraud in the United States results in losses of approximately $80 billion a year. Although there are many books available that describe how to "detect" healthcare fraud, few address what must be done after the fraud is detected. Filling this need, Charles Piper's Healthcare Fraud Investigation Guidebook details not only how to detect healthcare fraud, but also how to "investigate" and prove the wrongdoing to increase the likelihood of successful prosecution in court.The book starts by covering the history of healthcare insurance and the various types of fraud schemes. It presents Charles Piper's unique approach to investigating (The Piper Method) which allows readers to conduct as many as 10 simultaneous investigations for each case. It emphasizes the importance of simultaneously searching for waste and abuse as well as systemic weaknesses and deficiencies that caused or contributed to the problem or wrongdoing under investigation and then make recommendations for improvement. It also provides: Questions to ask whistleblowers, complainants, employers, employees, and healthcare providers who are suspects Tips on investigative case planning, goals, and strategies Sample visual aids for use when briefing others about your investigative findings Guidance on presenting information obtained from healthcare investigations and on how to testify in court Techniques for uncovering previously undetected fraud The book includes a sample case study that walks readers through a mock case from the time the case is received through the end. The case study demonstrates how to initiate, plan, and conduct a thorough and complete healthcare fraud investigation while incorporating Piper's proven methodology.Sharing insights gained through Charles Piper's decades of experience as a federal special agent and certified fraud examiner, th

Security Strategy - From Requirements to Reality (Hardcover): Bill Stackpole, Eric Oksendahl Security Strategy - From Requirements to Reality (Hardcover)
Bill Stackpole, Eric Oksendahl
R5,360 Discovery Miles 53 600 Ships in 10 - 15 working days

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

A Technical Guide to IPSec Virtual Private Networks (Hardcover): James S. Tiller A Technical Guide to IPSec Virtual Private Networks (Hardcover)
James S. Tiller
R5,082 Discovery Miles 50 820 Ships in 10 - 15 working days

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture... Ethics and the Internal Auditor's Political Dilemma - Tools and Techniques to Evaluate a Company's Ethical Culture (Hardcover)
Lynn Fountain
R5,495 Discovery Miles 54 950 Ships in 10 - 15 working days

This book helps auditors understand the reality of performing the internal audit role and the importance of properly managing ethical standards. It provides many examples of ethical conflicts and proposes alternative actions for the internal auditor. Internal auditors are well-schooled on the IIA Standards, but the reality is that the pressure placed on internal auditors related to execution of work and upholding ethical standards can be very difficult. Regardless of best practice or theory, auditors must be personally prepared to manage through issues they run across.

Managing A Network Vulnerability Assessment (Hardcover): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Hardcover)
Thomas R. Peltier, Justin Peltier, John A Blackley
R5,073 Discovery Miles 50 730 Ships in 10 - 15 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders. Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Unauthorized Access - The Crisis in Online Privacy and Security (Hardcover): Richard Warner, Robert Sloan Unauthorized Access - The Crisis in Online Privacy and Security (Hardcover)
Richard Warner, Robert Sloan
R5,509 Discovery Miles 55 090 Ships in 10 - 15 working days

Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security.

The Frugal CISO - Using Innovation and Smart Approaches to Maximize Your Security Posture (Hardcover): Kerry Ann Anderson The Frugal CISO - Using Innovation and Smart Approaches to Maximize Your Security Posture (Hardcover)
Kerry Ann Anderson
R5,083 Discovery Miles 50 830 Ships in 10 - 15 working days

If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets. The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture describes techniques you can immediately put to use to run an effective and efficient information-security management program in today's cost-cutting environment.The book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results. This strategy is designed to work across a wide variety of business sectors and economic conditions and focuses on producing long-term results through investment in people and technology.The text illustrates real-world perspectives that reflect the day-to-day issues that you face in running an enterprise's security operations. Focused on managing information security programs for long-term operational success, in terms of efficiency, effectiveness, and budgeting ability, this book will help you develop the fiscal proficiency required to navigate the budgeting process.After reading this book you will understand how to manage an information security program with a limited budget, while still maintaining an appropriate level of security controls and meeting compliance requirements. The concepts and methods identified in this book are applicable to a wide variation of teams, regardless of organizational size or budget.

Social Networking as a Criminal Enterprise (Hardcover): Catherine D. Marcum, George E. Higgins Social Networking as a Criminal Enterprise (Hardcover)
Catherine D. Marcum, George E. Higgins
R5,771 Discovery Miles 57 710 Ships in 10 - 15 working days

As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With insight from field experts, this book examines: The history of social networking and the process of developing an online identity Schools of criminological theory and how they relate to criminality on social networking websites Forms of criminal behavior that can be performed utilizing social networking websites Criminality via texting, identity theft, and hacking Adolescents as offenders and victims in cyberbullying and digital piracy Online sexual victimization, including child pornography and sexual solicitation of youth The book concludes by discussing law enforcement's response, including new techniques and training, type of evidence, and use of experts. It also discusses how the corrections system has been affected by these types of offenders. Discussion questions at the end of each chapter encourage critical thinking and case studies help place the material in context. Ideal for students and scholars, the book offers a comprehensive examination of how the emergence of social networking has affected criminality online, and how it has impacted the criminal justice system.

Secure Java - For Web Application Development (Hardcover): Abhay Bhargav, B. V Kumar Secure Java - For Web Application Development (Hardcover)
Abhay Bhargav, B. V Kumar
R5,496 Discovery Miles 54 960 Ships in 10 - 15 working days

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure programming, risk assessment, and threat modeling explaining how to integrate these practices into a secure software development life cycle. From the risk assessment phase to the proof of concept phase, the book details a secure web application development process. The authors provide in-depth implementation guidance and best practices for access control, cryptography, logging, secure coding, and authentication and authorization in web application development. Discussing the latest application exploits and vulnerabilities, they examine various options and protection mechanisms for securing web applications against these multifarious threats. The book is organized into four sections: Provides a clear view of the growing footprint of web applications Explores the foundations of secure web application development and the risk management process Delves into tactical web application security development with Java EE Deals extensively with security testing of web applications This complete reference includes a case study of an e-commerce company facing web application security challenges, as well as specific techniques for testing the security of web applications. Highlighting state-of-the-art tools for web application security testing, it supplies valuable insight on how to meet important security compliance requirements, including PCI-DSS, PA-DSS, HIPAA, and GLBA. The book also includes an appendix that covers the application security guidelines for the payment card industry standards.

Protecting Critical Infrastructures Against Cyber-Attack (Hardcover): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Hardcover)
Stephen Lukasik
R5,186 Discovery Miles 51 860 Ships in 10 - 15 working days

The threat that is posed by "cyber-warriors" is illustrated by recent incidents such as the Year 2000 "Millennium Bug". Strategies to reduce the risk that cyber-attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Physical and Data-Link Security Techniques for Future Communication Systems (Hardcover, 1st ed. 2016): Marco Baldi, Stefano... Physical and Data-Link Security Techniques for Future Communication Systems (Hardcover, 1st ed. 2016)
Marco Baldi, Stefano Tomasin
R5,202 R4,610 Discovery Miles 46 100 Save R592 (11%) Ships in 10 - 15 working days

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.

GCIH GIAC Certified Incident Handler All-in-One Exam Guide (Paperback): Nick Mitropoulos GCIH GIAC Certified Incident Handler All-in-One Exam Guide (Paperback)
Nick Mitropoulos
R1,318 R1,071 Discovery Miles 10 710 Save R247 (19%) Ships in 9 - 17 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler exam Prepare for the current version of the GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation resource. The book lays out the latest techniques for detecting, responding to, and resolving security incidents. Designed to help you prepare for the rigorous exam with ease, the guide also serves as an ideal on-the-job reference. Written by an expert in the field, GCIH GIAC Certified Incident Handler All-in-One Exam Guide lays out the advanced security incident handling skills covered on the test. You will get realistic attack examples that demonstrate threats faced commonly in cyber security. To aid in self-study, each chapter includes exam tips that highlight key exam information, a chapter summary that serves as a quick review of the chapter's salient points, and end-of-chapter questions that simulate those on the live exam. * Offers 100% coverage of every objective for the GIAC Certified Incident Handler exam * Includes online access to 300 practice exam questions in the Total Tester exam engine * Written by a seasoned cyber security professional and experienced author

Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos,... Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings (Hardcover, 1st ed. 2020)
Nathan Clarke, Steven Furnell
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2020, held in Mytilene, Lesbos, Greece, in July 2020.* The 27 full papers presented in this volume were carefully reviewed and selected from 43 submissions. They are organized in the following topical sections: privacy and COVID-19; awareness and training; social engineering; security behavior; education; end-user security; usable security; security policy; and attitudes and perceptions. *The symposium was held virtually due to the COVID-19 pandemic.

Human-Centric Computing in a Data-Driven Society - 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14... Human-Centric Computing in a Data-Driven Society - 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, Tokyo, Japan, September 9-11, 2020, Proceedings (Hardcover, 1st ed. 2020)
David Kreps, Taro Komukai, T. V. Gopal, Kaori Ishii
R3,847 Discovery Miles 38 470 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, which was supposed take place in Tokyo, Japan, in September 2020, but the conference was cancelled due to the COVID-19 crisis.The 31 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers deal with the constantly evolving intimate relationship between humans and technology. They are organized in the following sections: ethical and legal considerations in a data-driven society; the data-driven society; peace and war; our digital lives; individuals in data-driven society; and gender, diversity and ICT.

Handbook of System Safety and Security - Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety,... Handbook of System Safety and Security - Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems (Hardcover)
Edward Griffor
R4,000 Discovery Miles 40 000 Ships in 10 - 15 working days

Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system's performance.

Women Securing the Future with TIPPSS for IoT - Trust, Identity, Privacy, Protection, Safety, Security for the Internet of... Women Securing the Future with TIPPSS for IoT - Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things (Hardcover, 1st ed. 2019)
Florence D. Hudson
R3,338 Discovery Miles 33 380 Ships in 18 - 22 working days

This book provides insight and expert advice on the challenges of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for the growing Internet of Things (IoT) in our connected world. Contributors cover physical, legal, financial and reputational risk in connected products and services for citizens and institutions including industry, academia, scientific research, healthcare and smart cities. As an important part of the Women in Science and Engineering book series, the work highlights the contribution of women leaders in TIPPSS for IoT, inspiring women and men, girls and boys to enter and apply themselves to secure our future in an increasingly connected world. The book features contributions from prominent female engineers, scientists, business and technology leaders, policy and legal experts in IoT from academia, industry and government. Provides insight into women's contributions to the field of Trust, Identity, Privacy, Protection, Safety and Security (TIPPSS) for IoT Presents information from academia, research, government and industry into advances, applications, and threats to the growing field of cybersecurity and IoT Includes topics such as hacking of IoT devices and systems including healthcare devices, identity and access management, the issues of privacy and your civil rights, and more

Proceedings of the International Conference on IT Convergence and Security 2011 (Hardcover, 2012 ed.): Kuinam J. Kim, Seong Jin... Proceedings of the International Conference on IT Convergence and Security 2011 (Hardcover, 2012 ed.)
Kuinam J. Kim, Seong Jin Ahn
R5,268 Discovery Miles 52 680 Ships in 18 - 22 working days

As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all fields of the industry, heterogeneous technologies have converged with information technology resulting in a new paradigm, information technology convergence. In the process of information technology convergence, the latest issues in the structure of data, system, network, and infrastructure have become the most challenging task. Proceedings of the International Conference on IT Convergence and Security 2011 approaches the subject matter with problems in technical convergence and convergences of security technology by looking at new issues that arise from techniques converging. The general scope is convergence security and the latest information technology with the following most important features and benefits: 1. Introduction of the most recent information technology and its related ideas 2. Applications and problems related to technology convergence, and its case studies 3. Introduction of converging existing security techniques through convergence security Overall, after reading Proceedings of the International Conference on IT Convergence and Security 2011, readers will understand the most state of the art information strategies and technologies of convergence security.

SCION: A Secure Internet Architecture (Hardcover, 1st ed. 2017): Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk,... SCION: A Secure Internet Architecture (Hardcover, 1st ed. 2017)
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat
R2,393 R2,114 Discovery Miles 21 140 Save R279 (12%) Ships in 10 - 15 working days

This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.

Circuits and Systems for Security and Privacy (Hardcover): Farhana Sheikh, Leonel Sousa Circuits and Systems for Security and Privacy (Hardcover)
Farhana Sheikh, Leonel Sousa
R5,638 Discovery Miles 56 380 Ships in 10 - 15 working days

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.

Honeypots and Routers - Collecting Internet Attacks (Hardcover): Mohssen Mohammed, Habib ur Rehman Honeypots and Routers - Collecting Internet Attacks (Hardcover)
Mohssen Mohammed, Habib ur Rehman
R1,982 Discovery Miles 19 820 Ships in 10 - 15 working days

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment. Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications The book then details how to use honeypots to capture network attacks. A honeypot is a system designed to trap an adversary into attacking the information systems in an organization. The book describes a technique for collecting the characteristics of the Internet attacks in honeypots and analyzing them so that their signatures can be produced to prevent future attacks. It also discusses the role of routers in analyzing network traffic and deciding whether to filter or forward it. The final section of the book presents implementation details for a real network designed to collect attacks of zero-day polymorphic worms. It discusses the design of a double-honeynet system architecture, the required software tools, and the configuration process using VMware. With the concepts and skills you learn in this book, you will have the expertise to deploy a honeypot solution in your network that can track attackers and provide valuable information about their source, tools, and tactics.

Internet Password Logbook (Red Leatherette) - Keep track of usernames, passwords, web addresses in one easy and organized... Internet Password Logbook (Red Leatherette) - Keep track of usernames, passwords, web addresses in one easy and organized location (Hardcover)
Editors of Rock Point
R202 R129 Discovery Miles 1 290 Save R73 (36%) Ships in 10 - 15 working days

Just say "no" to piles of sticky notes and scraps of paper with your passwords and logins! Keep track of them in this elegant, yet inconspicuous, alphabetically tabbed red leatherette notebook. In this 4" x 5.75" hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You'll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.

Network Security Metrics (Hardcover, 1st ed. 2017): Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics (Hardcover, 1st ed. 2017)
Lingyu Wang, Sushil Jajodia, Anoop Singhal
R3,965 Discovery Miles 39 650 Ships in 10 - 15 working days

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Guide for Biomedical Signals…
Abdulhamit Subasi Paperback R3,072 Discovery Miles 30 720
The Write Stuff - Evaluations of…
Barry L. Beyerstein Hardcover R792 R739 Discovery Miles 7 390
Access 2021 / Microsoft 365 Programming…
Julitta Korol Paperback R1,643 R1,415 Discovery Miles 14 150
Calligraphy Paper - Slanted Grid
Lynette Cullen Paperback R168 Discovery Miles 1 680
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, … Hardcover R1,961 R1,830 Discovery Miles 18 300
Machine Learning Applications - Emerging…
Rik Das, Siddhartha Bhattacharyya, … Hardcover R3,528 Discovery Miles 35 280
Your Handwriting Can Change Your Life
Vimala Rodgers Paperback R473 R435 Discovery Miles 4 350
Dynamic Profiles for Voting Advice…
Luis Teran Hardcover R2,654 Discovery Miles 26 540
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Inkslingers Ball - A Claudia Rose Novel
Sheila Lowe Paperback R374 Discovery Miles 3 740

 

Partners