0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,094)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Edge Computing - Models, Technologies and Applications (Hardcover): Javid Taheri, Shuiguang Deng Edge Computing - Models, Technologies and Applications (Hardcover)
Javid Taheri, Shuiguang Deng
R3,687 R3,326 Discovery Miles 33 260 Save R361 (10%) Ships in 18 - 22 working days
Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover): Victor Lobo, Anacleto Correia Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover)
Victor Lobo, Anacleto Correia
R6,167 Discovery Miles 61 670 Ships in 18 - 22 working days

The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,167 Discovery Miles 71 670 Ships in 18 - 22 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,375 Discovery Miles 23 750 Ships in 18 - 22 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

Information Security Management (Hardcover): Fiona Hobbs Information Security Management (Hardcover)
Fiona Hobbs
R3,169 R2,871 Discovery Miles 28 710 Save R298 (9%) Ships in 18 - 22 working days
Economics of Information Security (Hardcover, 2004 ed.): L. Jean Camp, Stephen Lewis Economics of Information Security (Hardcover, 2004 ed.)
L. Jean Camp, Stephen Lewis
R4,177 Discovery Miles 41 770 Ships in 18 - 22 working days

Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019): Panagiotis Karampelas, Jalal... From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019)
Panagiotis Karampelas, Jalal Kawash, Tansel Ozyer
R3,801 Discovery Miles 38 010 Ships in 18 - 22 working days

This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.

Information Security: Principles and Practices (Hardcover): Miles Carr Information Security: Principles and Practices (Hardcover)
Miles Carr
R2,864 R2,604 Discovery Miles 26 040 Save R260 (9%) Ships in 18 - 22 working days
VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019): Shojiro Asai VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019)
Shojiro Asai
R5,999 Discovery Miles 59 990 Ships in 18 - 22 working days

This book discusses the new roles that the VLSI (very-large-scale integration of semiconductor circuits) is taking for the safe, secure, and dependable design and operation of electronic systems. The book consists of three parts. Part I, as a general introduction to this vital topic, describes how electronic systems are designed and tested with particular emphasis on dependability engineering, where the simultaneous assessment of the detrimental outcome of failures and cost of their containment is made. This section also describes the related research project "Dependable VLSI Systems," in which the editor and authors of the book were involved for 8 years. Part II addresses various threats to the dependability of VLSIs as key systems components, including time-dependent degradations, variations in device characteristics, ionizing radiation, electromagnetic interference, design errors, and tampering, with discussion of technologies to counter those threats. Part III elaborates on the design and test technologies for dependability in such applications as control of robots and vehicles, data processing, and storage in a cloud environment and heterogeneous wireless telecommunications. This book is intended to be used as a reference for engineers who work on the design and testing of VLSI systems with particular attention to dependability. It can be used as a textbook in graduate courses as well. Readers interested in dependable systems from social and industrial-economic perspectives will also benefit from the discussions in this book.

Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and... Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and Cyber threats (Hardcover, 1st ed. 2018)
Andrea Malizia, Marco D'Arienzo
R2,728 Discovery Miles 27 280 Ships in 18 - 22 working days

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Information Security in Diverse Computing Environments (Hardcover): Anne V. D. M. Kayem, Christoph Meinel Information Security in Diverse Computing Environments (Hardcover)
Anne V. D. M. Kayem, Christoph Meinel
R6,147 Discovery Miles 61 470 Ships in 18 - 22 working days

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover): Ganesh Chandra Deka, Sambit... Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover)
Ganesh Chandra Deka, Sambit Bakshi
R8,370 Discovery Miles 83 700 Ships in 18 - 22 working days

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Big Data Security (Hardcover): Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya Big Data Security (Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
R3,625 Discovery Miles 36 250 Ships in 10 - 15 working days

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Cybersecurity Measures for E-Government Frameworks (Hardcover): Noor Zaman, Imdad Ali Shah, Samina Rajper Cybersecurity Measures for E-Government Frameworks (Hardcover)
Noor Zaman, Imdad Ali Shah, Samina Rajper
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

E-governance is an application of IT; holding uses for the delivery of Government services, information exchange between Government to public, e-business, and various. However, the aim of cybersecurity is to provide security from cyber-attacks from the view of emerging technology is used by hackers. Hence, it is important to provide fast protection application software and structure. In this scenario, the government may be focused to provide capable Internet carefully without the risk of fraud. These days the study deliberates about the issue of the world while technology is helping and fruitful on each step of life like e-Governance applications. Though, has been limited study has been done by a previous study on protocols of cybersecurity for e-Governance.

Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover): Suhasini Verma, Vidhisha Vyas, Keshav Kaushik Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover)
Suhasini Verma, Vidhisha Vyas, Keshav Kaushik
R6,597 Discovery Miles 65 970 Ships in 18 - 22 working days

Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

Cyber Security Awareness for Corporate Directors and Board Members (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Corporate Directors and Board Members (Paperback)
David Willson, Henry Dalziel
R1,108 Discovery Miles 11 080 Ships in 10 - 15 working days

Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.

Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover): Puech Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover)
Puech
R3,502 Discovery Miles 35 020 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.

Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover): Jean-Loup Richet Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover)
Jean-Loup Richet
R6,085 Discovery Miles 60 850 Ships in 18 - 22 working days

Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Recent Advances in Cryptography and Network Security (Hardcover): Pinaki Mitra Recent Advances in Cryptography and Network Security (Hardcover)
Pinaki Mitra
R2,550 Discovery Miles 25 500 Ships in 18 - 22 working days
Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover)
Rebecca Slayton
R2,941 Discovery Miles 29 410 Ships in 18 - 22 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R4,910 Discovery Miles 49 100 Ships in 18 - 22 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,285 Discovery Miles 12 850 Ships in 10 - 15 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

Essential Skills for Hackers (Paperback): Kevin Cardwell, Henry Dalziel Essential Skills for Hackers (Paperback)
Kevin Cardwell, Henry Dalziel
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Hacking - Computer Hacking for…
Adam Dodson Hardcover R546 R500 Discovery Miles 5 000
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310

 

Partners