0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (238)
  • R250 - R500 (551)
  • R500+ (5,270)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover): Michael Gentile, Ron Collette, Thomas D. August The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover)
Michael Gentile, Ron Collette, Thomas D. August
R1,252 Discovery Miles 12 520 Ships in 10 - 15 working days

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.

Cybersecurity Education for Awareness and Compliance (Hardcover): Ismini Vasileiou, Steven Furnell Cybersecurity Education for Awareness and Compliance (Hardcover)
Ismini Vasileiou, Steven Furnell
R5,537 Discovery Miles 55 370 Ships in 10 - 15 working days

Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.

Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24,... Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Lynette Drevin, Natalia Miloslavskaya, Wai Sze Leung, Sune Von Solms
R2,738 Discovery Miles 27 380 Ships in 12 - 19 working days

This book constitutes the refereed proceedings of the 14th IFIP WG 11.8 World Conference on Information Security Education, WISE 14, held virtually in June 2021. The 8 papers presented together with a special chapter showcasing the history of WISE and two workshop papers were carefully reviewed and selected from 19 submissions. The papers are organized in the following topical sections: a roadmap for building resilience; innovation in curricula; teaching methods and tools; and end-user security.

Blockchain Technology and Innovations in Business Processes (Hardcover, 1st ed. 2021): Srikanta Patnaik, Tao-Sheng Wang, Tao... Blockchain Technology and Innovations in Business Processes (Hardcover, 1st ed. 2021)
Srikanta Patnaik, Tao-Sheng Wang, Tao Shen, Sushanta Kumar Panigrahi
R5,368 Discovery Miles 53 680 Ships in 10 - 15 working days

This edited book provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness. The book presents original unpublished research papers on blockchain technology and business management on novel architectures, prototypes and case studies.

21st Century Prometheus - Managing CBRN Safety and Security Affected by Cutting-Edge Technologies (Hardcover, 1st ed. 2020):... 21st Century Prometheus - Managing CBRN Safety and Security Affected by Cutting-Edge Technologies (Hardcover, 1st ed. 2020)
Maurizio Martellini, Ralf Trapp
R4,689 Discovery Miles 46 890 Ships in 12 - 19 working days

This book describes the evolving CBRN risk landscape and highlights advances in the "core" CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks, challenging certain assumptions that underlie current control regimes. The book also shows how technologies can be enablers for more effective strategies to mitigate these risks. 21st-century safety and security risks emanating from chemical, biological, radiological and nuclear materials - whether resulting from natural events, accidents or malevolent use - are increasingly shaped by technologies that enable their development, production or use in ways that differ from the past. Artificial intelligence, the use of cyberspace, the revolution in the life sciences, new manufacturing methods, new platforms and equipment for agent delivery, hypersonic weapons systems, information tools utilised in hybrid warfare - these and other technologies are reshaping the global security environment and CBRN landscape. They are leading to a growing potential for highly targeted violence, and they can lead to greater instability and vulnerability worldwide. At the same time, technology offers solutions to manage CBRN risks. Examples are faster detection, more accurate characterisation of the nature and origin of CBRN agents, new forensic investigation methods, or new medical treatments for victims of CBRN incidents. New educational concepts help to foster a culture of responsibility in science and technology and strengthen governance. New training methods help develop practical skills to manage CBRN risks more effectively. The book concludes that there is a growing need for a holistic framework towards CBRN risk mitigation. Traditional arms control mechanisms such as global, regional or bilateral treaties and export controls are still needed, as they provide a necessary legal and institutional framework. But laws and technology denial alone will not suffice, and institutional mechanisms can at times be weak. Given the pace of technological progress and the diffusion of critical knowledge, tools and materials, policymakers must accept that CBRN risks cannot be eliminated altogether. Instead, society has to learn to manage these risks and develop resilience against them. This requires a "softer", broadly based multi-stakeholder approach involving governments, industry, the research and development communities, educators, and civil society. Furthermore, educating policymakers that cutting-edge technologies may seriously affect global strategic stability could create incentives for developing a more creative and contemporary arms control strategy that fosters cooperation rather than incremental polarisation.

Network Security, Administration and Management - Advancing Technology and Practice (Hardcover): Dulal Chandra Kar, Mahbubur... Network Security, Administration and Management - Advancing Technology and Practice (Hardcover)
Dulal Chandra Kar, Mahbubur Rahman Syed
R5,633 Discovery Miles 56 330 Ships in 12 - 19 working days

The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific tools and techniques that are applicable to specific systems or situations only, and hence, have a great deal of difficulty in applying their knowledge of security when a technology, a system, or a situation changes. Network Security, Administration and Management: Advancing Technology and Practice identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.

Advances in Wireless Communications and Applications - Wireless Technology: Intelligent Network Technologies, Smart Services... Advances in Wireless Communications and Applications - Wireless Technology: Intelligent Network Technologies, Smart Services and Applications, Proceedings of 3rd ICWCA 2019 (Hardcover, 1st ed. 2021)
Roumen Kountchev, Aniket Mahanti, Shen Chong, Srikanta Patnaik, Margarita Favorskaya
R4,591 Discovery Miles 45 910 Ships in 10 - 15 working days

This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.

Network Security Attacks and Countermeasures (Hardcover): Kumar G. Dileep, Manoj Kumar Singh, M. K. Jayanthi Network Security Attacks and Countermeasures (Hardcover)
Kumar G. Dileep, Manoj Kumar Singh, M. K. Jayanthi
R5,850 Discovery Miles 58 500 Ships in 10 - 15 working days

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover)
Information R Management Association
R12,953 Discovery Miles 129 530 Ships in 10 - 15 working days
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R5,019 Discovery Miles 50 190 Ships in 12 - 19 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Ethical Impact of Technological Advancements and Applications in Society (Hardcover): Rocci Luppicini Ethical Impact of Technological Advancements and Applications in Society (Hardcover)
Rocci Luppicini
R5,629 Discovery Miles 56 290 Ships in 12 - 19 working days

In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer ethics, engineering ethics, and biotech ethics as well as nascent areas of research such as nanoethics, artificial morality, and neuroethics.

Handbook of Communications Security (Hardcover): F. Garzia Handbook of Communications Security (Hardcover)
F. Garzia
R8,864 Discovery Miles 88 640 Ships in 12 - 19 working days

Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or lost of information during communication can generate material and non material economic damages from both a personal and collective point of view. Giving the reader information relating to all aspects of communications security, this book begins at the base ideas and builds to reach the most advanced and updated concepts. The comprehensive coverage makes the book a one-stop reference for integrated system designers, telecommunication designers, system engineers, system analysts, security managers, technicians, intelligence personnel, security personnel, police, army, private investigators, scientists, graduate and postgraduate students and anyone that needs to communicate in a secure way.

Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges - ICBCC 2019, UMKC, Kansas City, USA... Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges - ICBCC 2019, UMKC, Kansas City, USA (Hardcover, 1st ed. 2020)
V. Vijayakumar, V. Neelanarayanan, Praveen Rao, Janet Light
R4,578 Discovery Miles 45 780 Ships in 10 - 15 working days

The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on how to address the current challenges in the field. As such it is a valuable reference resource for researchers and practitioners in academia and industry.

Smart Assisted Living - Toward An Open Smart-Home Infrastructure (Hardcover, 1st ed. 2020): Feng Chen, Rebeca I.... Smart Assisted Living - Toward An Open Smart-Home Infrastructure (Hardcover, 1st ed. 2020)
Feng Chen, Rebeca I. Garcia-Betances, Liming Chen, Maria Fernanda Cabrera-Umpierrez, Chris Nugent
R3,846 Discovery Miles 38 460 Ships in 10 - 15 working days

Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure. This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems. This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.

Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia,... Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers (Hardcover, 1st ed. 2021)
Michael Friedewald, Stefan Schiffner, Stephan Krenn
R1,624 Discovery Miles 16 240 Ships in 10 - 15 working days

This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.

Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Hardcover, 1st ed. 2021): Debahuti Mishra, Rajkumar... Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Hardcover, 1st ed. 2021)
Debahuti Mishra, Rajkumar Buyya, Prasant Mohapatra, Srikanta Patnaik
R6,078 Discovery Miles 60 780 Ships in 10 - 15 working days

This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.

Deep Biometrics (Hardcover, 1st ed. 2020): Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger Deep Biometrics (Hardcover, 1st ed. 2020)
Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
R3,839 Discovery Miles 38 390 Ships in 10 - 15 working days

This book highlights new advances in biometrics using deep learning toward deeper and wider background, deeming it "Deep Biometrics". The book aims to highlight recent developments in biometrics using semi-supervised and unsupervised methods such as Deep Neural Networks, Deep Stacked Autoencoder, Convolutional Neural Networks, Generative Adversary Networks, and so on. The contributors demonstrate the power of deep learning techniques in the emerging new areas such as privacy and security issues, cancellable biometrics, soft biometrics, smart cities, big biometric data, biometric banking, medical biometrics, healthcare biometrics, and biometric genetics, etc. The goal of this volume is to summarize the recent advances in using Deep Learning in the area of biometric security and privacy toward deeper and wider applications. Highlights the impact of deep learning over the field of biometrics in a wide area; Exploits the deeper and wider background of biometrics, such as privacy versus security, biometric big data, biometric genetics, and biometric diagnosis, etc.; Introduces new biometric applications such as biometric banking, internet of things, cloud computing, and medical biometrics.

Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
R5,029 Discovery Miles 50 290 Ships in 12 - 19 working days

This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.

Recent Advances in Cryptography and Network Security (Hardcover): Pinaki Mitra Recent Advances in Cryptography and Network Security (Hardcover)
Pinaki Mitra
R2,903 Discovery Miles 29 030 Ships in 10 - 15 working days
Technology Development for Security Practitioners (Hardcover, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Hardcover, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R3,108 Discovery Miles 31 080 Ships in 10 - 15 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Game Theory for Cyber Deception - From Theory to Applications (Hardcover, 1st ed. 2021): Jeffrey Pawlick, Quanyan Zhu Game Theory for Cyber Deception - From Theory to Applications (Hardcover, 1st ed. 2021)
Jeffrey Pawlick, Quanyan Zhu
R3,268 Discovery Miles 32 680 Ships in 12 - 19 working days

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.

Information Security: Principles and Practices (Hardcover): Miles Carr Information Security: Principles and Practices (Hardcover)
Miles Carr
R3,273 R2,964 Discovery Miles 29 640 Save R309 (9%) Ships in 10 - 15 working days
CMOS Analog IC Design for 5G and Beyond (Hardcover, 1st ed. 2021): Sangeeta Singh, Rajeev Arya, M.P. Singh, Brijesh Iyer CMOS Analog IC Design for 5G and Beyond (Hardcover, 1st ed. 2021)
Sangeeta Singh, Rajeev Arya, M.P. Singh, Brijesh Iyer
R5,349 Discovery Miles 53 490 Ships in 10 - 15 working days

This book is focused on addressing the designs of FinFET-based analog ICs for 5G and E-band communication networks. In addition, it also incorporates some of the contemporary developments over different fields. It highlights the latest advances, problems and challenges and presents the latest research results in the field of mm-wave integrated circuits designing based on scientific literature and its practical realization. The traditional approaches are excluded in this book. The authors cover various design guidelines to be taken care for while designing these circuits and detrimental scaling effects on the same. Moreover, Gallium Nitrides (GaN) are also reported to show huge potentials for the power amplifier designing required in 5G communication network. Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing. This book incorporates the most recent FinFET architecture for the analog IC designing and the scaling effects along with the GaN technology as well.

Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R2,233 Discovery Miles 22 330 Ships in 12 - 19 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019): Amit Kumar Singh, Anand... Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019)
Amit Kumar Singh, Anand Mohan
R7,190 Discovery Miles 71 900 Ships in 12 - 19 working days

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Little Sprouts and the Dao of Parenting…
Erin Cline Hardcover R661 Discovery Miles 6 610
Forward (Study Guide) - Discovering…
David Jeremiah Paperback R248 Discovery Miles 2 480
Biography of a Yogi - Yogananda and the…
Anya P. Foxen Hardcover R3,171 Discovery Miles 31 710
Picturing the Gospel - Tapping the Power…
Neil Livingstone Paperback R671 R596 Discovery Miles 5 960
Order in Early Chinese Excavated Texts…
Misha Tadd Hardcover R3,208 Discovery Miles 32 080
Sacred Mountains
Stikker Allerd Hardcover R520 Discovery Miles 5 200
Opferkult Und Priestertum in Alt-Israel…
Ulrike Dahm Hardcover R3,627 Discovery Miles 36 270
The Art of War
Sun Tzu Hardcover R851 R735 Discovery Miles 7 350
The Sayings of Lao Tzu - Illustrated…
Lao Tzu, Lionel Giles Hardcover R472 Discovery Miles 4 720
Kingdom Come - How Jesus Wants to Change…
Allen M. Wakabayashi Paperback R645 R576 Discovery Miles 5 760

 

Partners