0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (210)
  • R250 - R500 (607)
  • R500+ (5,107)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Securing E-Business Systems - A Guide for Managers & Executives (Hardcover): T Braithwaite Securing E-Business Systems - A Guide for Managers & Executives (Hardcover)
T Braithwaite
R1,011 R864 Discovery Miles 8 640 Save R147 (15%) Ships in 18 - 22 working days

"This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation’s enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy." –John R. Thomas, Colonel, U.S. Army, Retired, Former Commander of the DoD, Global Operations and Security Center

Today’s e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts to meet a company’s changing security needs.

Topics include:

  • Security weaknesses
  • Safeguarding technologies
  • Countermeasure best practices
  • Establishing an adaptable e-business security management program
  • Essential elements of a corporate security management program
  • Functions, structure, staffing, and contracting considerations in security management
  • Implementing intrusion detection technology
  • Designing tomorrow’s e-business application for secured operations
  • Contemporary rationales for justifying increased spending on security programs
  • Emerging liability issues for e-businesses
Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,167 Discovery Miles 71 670 Ships in 18 - 22 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,375 Discovery Miles 23 750 Ships in 18 - 22 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

Information Security Management (Hardcover): Fiona Hobbs Information Security Management (Hardcover)
Fiona Hobbs
R3,169 R2,871 Discovery Miles 28 710 Save R298 (9%) Ships in 18 - 22 working days
Economics of Information Security (Hardcover, 2004 ed.): L. Jean Camp, Stephen Lewis Economics of Information Security (Hardcover, 2004 ed.)
L. Jean Camp, Stephen Lewis
R4,177 Discovery Miles 41 770 Ships in 18 - 22 working days

Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019): Panagiotis Karampelas, Jalal... From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019)
Panagiotis Karampelas, Jalal Kawash, Tansel Ozyer
R3,801 Discovery Miles 38 010 Ships in 18 - 22 working days

This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.

Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover)
Rebecca Slayton
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Information Security: Principles and Practices (Hardcover): Miles Carr Information Security: Principles and Practices (Hardcover)
Miles Carr
R2,864 R2,604 Discovery Miles 26 040 Save R260 (9%) Ships in 18 - 22 working days
VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019): Shojiro Asai VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019)
Shojiro Asai
R5,999 Discovery Miles 59 990 Ships in 18 - 22 working days

This book discusses the new roles that the VLSI (very-large-scale integration of semiconductor circuits) is taking for the safe, secure, and dependable design and operation of electronic systems. The book consists of three parts. Part I, as a general introduction to this vital topic, describes how electronic systems are designed and tested with particular emphasis on dependability engineering, where the simultaneous assessment of the detrimental outcome of failures and cost of their containment is made. This section also describes the related research project "Dependable VLSI Systems," in which the editor and authors of the book were involved for 8 years. Part II addresses various threats to the dependability of VLSIs as key systems components, including time-dependent degradations, variations in device characteristics, ionizing radiation, electromagnetic interference, design errors, and tampering, with discussion of technologies to counter those threats. Part III elaborates on the design and test technologies for dependability in such applications as control of robots and vehicles, data processing, and storage in a cloud environment and heterogeneous wireless telecommunications. This book is intended to be used as a reference for engineers who work on the design and testing of VLSI systems with particular attention to dependability. It can be used as a textbook in graduate courses as well. Readers interested in dependable systems from social and industrial-economic perspectives will also benefit from the discussions in this book.

Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and... Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and Cyber threats (Hardcover, 1st ed. 2018)
Andrea Malizia, Marco D'Arienzo
R2,728 Discovery Miles 27 280 Ships in 18 - 22 working days

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Information Security in Diverse Computing Environments (Hardcover): Anne V. D. M. Kayem, Christoph Meinel Information Security in Diverse Computing Environments (Hardcover)
Anne V. D. M. Kayem, Christoph Meinel
R6,147 Discovery Miles 61 470 Ships in 18 - 22 working days

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover): Ganesh Chandra Deka, Sambit... Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover)
Ganesh Chandra Deka, Sambit Bakshi
R8,370 Discovery Miles 83 700 Ships in 18 - 22 working days

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Cyber Security Awareness for Corporate Directors and Board Members (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Corporate Directors and Board Members (Paperback)
David Willson, Henry Dalziel
R1,108 Discovery Miles 11 080 Ships in 10 - 15 working days

Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.

Cybersecurity Measures for E-Government Frameworks (Hardcover): Noor Zaman, Imdad Ali Shah, Samina Rajper Cybersecurity Measures for E-Government Frameworks (Hardcover)
Noor Zaman, Imdad Ali Shah, Samina Rajper
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

E-governance is an application of IT; holding uses for the delivery of Government services, information exchange between Government to public, e-business, and various. However, the aim of cybersecurity is to provide security from cyber-attacks from the view of emerging technology is used by hackers. Hence, it is important to provide fast protection application software and structure. In this scenario, the government may be focused to provide capable Internet carefully without the risk of fraud. These days the study deliberates about the issue of the world while technology is helping and fruitful on each step of life like e-Governance applications. Though, has been limited study has been done by a previous study on protocols of cybersecurity for e-Governance.

Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover): Puech Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover)
Puech
R3,502 Discovery Miles 35 020 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.

Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover): Jean-Loup Richet Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover)
Jean-Loup Richet
R6,085 Discovery Miles 60 850 Ships in 18 - 22 working days

Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Discrete Password Logbook - Kitty Cats Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Kitty Cats Edition (Hardcover)
Suzeteo Enterprises
R506 Discovery Miles 5 060 Ships in 18 - 22 working days
Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R4,910 Discovery Miles 49 100 Ships in 18 - 22 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Essential Skills for Hackers (Paperback): Kevin Cardwell, Henry Dalziel Essential Skills for Hackers (Paperback)
Kevin Cardwell, Henry Dalziel
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,285 Discovery Miles 12 850 Ships in 10 - 15 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover): S Geetha, Asnath Victy... Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover)
S Geetha, Asnath Victy Phamila
R5,575 Discovery Miles 55 750 Ships in 18 - 22 working days

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R604 Discovery Miles 6 040 Ships in 18 - 22 working days
Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print,... Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print, Hardcover, Large type / large print edition)
Faith V Summers
R471 Discovery Miles 4 710 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Handbook of Research on Advancing…
Kamaljeet Sandhu Hardcover R7,484 Discovery Miles 74 840
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
Advancements in Security and Privacy…
Ashwani Kumar, Seelam Sai Satyanarayana Reddy Hardcover R5,924 Discovery Miles 59 240
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610

 

Partners