0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (222)
  • R250 - R500 (558)
  • R500+ (5,322)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise (Paperback): J Minella Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise (Paperback)
J Minella
R1,288 R934 Discovery Miles 9 340 Save R354 (27%) Ships in 12 - 19 working days

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security. Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage--including data published for the first time--of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies Effective technical resources and real-world sample architectures Explorations of the relationships between security, wireless, and network elements Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.

Advances in Wireless Communications and Applications - Wireless Technology: Intelligent Network Technologies, Smart Services... Advances in Wireless Communications and Applications - Wireless Technology: Intelligent Network Technologies, Smart Services and Applications, Proceedings of 3rd ICWCA 2019 (Hardcover, 1st ed. 2021)
Roumen Kountchev, Aniket Mahanti, Shen Chong, Srikanta Patnaik, Margarita Favorskaya
R4,365 Discovery Miles 43 650 Ships in 10 - 15 working days

This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.

Network Security Attacks and Countermeasures (Hardcover): Kumar G. Dileep, Manoj Kumar Singh, M. K. Jayanthi Network Security Attacks and Countermeasures (Hardcover)
Kumar G. Dileep, Manoj Kumar Singh, M. K. Jayanthi
R5,562 Discovery Miles 55 620 Ships in 10 - 15 working days

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover)
Information R Management Association
R12,309 Discovery Miles 123 090 Ships in 10 - 15 working days
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R4,922 Discovery Miles 49 220 Ships in 12 - 19 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Ethical Impact of Technological Advancements and Applications in Society (Hardcover): Rocci Luppicini Ethical Impact of Technological Advancements and Applications in Society (Hardcover)
Rocci Luppicini
R5,359 Discovery Miles 53 590 Ships in 10 - 15 working days

In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer ethics, engineering ethics, and biotech ethics as well as nascent areas of research such as nanoethics, artificial morality, and neuroethics.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R935 R775 Discovery Miles 7 750 Save R160 (17%) Ships in 12 - 19 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R2,132 R1,485 Discovery Miles 14 850 Save R647 (30%) Ships in 12 - 19 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Software Piracy Exposed (Paperback): Ron Honick Software Piracy Exposed (Paperback)
Ron Honick
R980 Discovery Miles 9 800 Ships in 12 - 19 working days

This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
* This book is about software piracy--what it is and how it's done
* This is the first book ever to describe how software is actually stolen and traded over the internet
* Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software

Handbook of Communications Security (Hardcover): F. Garzia Handbook of Communications Security (Hardcover)
F. Garzia
R8,692 Discovery Miles 86 920 Ships in 12 - 19 working days

Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or lost of information during communication can generate material and non material economic damages from both a personal and collective point of view. Giving the reader information relating to all aspects of communications security, this book begins at the base ideas and builds to reach the most advanced and updated concepts. The comprehensive coverage makes the book a one-stop reference for integrated system designers, telecommunication designers, system engineers, system analysts, security managers, technicians, intelligence personnel, security personnel, police, army, private investigators, scientists, graduate and postgraduate students and anyone that needs to communicate in a secure way.

Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture,... Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) (Hardcover)
Benjamin Walker
R619 R562 Discovery Miles 5 620 Save R57 (9%) Ships in 10 - 15 working days
Smart Assisted Living - Toward An Open Smart-Home Infrastructure (Hardcover, 1st ed. 2020): Feng Chen, Rebeca I.... Smart Assisted Living - Toward An Open Smart-Home Infrastructure (Hardcover, 1st ed. 2020)
Feng Chen, Rebeca I. Garcia-Betances, Liming Chen, Maria Fernanda Cabrera-Umpierrez, Chris Nugent
R3,658 Discovery Miles 36 580 Ships in 10 - 15 working days

Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle to the rapid development and deployment of Smart Home (SH) solutions essentially arises from the nature of the SH field, which is multidisciplinary and involves diverse applications and various stakeholders. Accordingly, an alternative to a one-size-fits-all approach is needed in order to advance the state of the art towards an open SH infrastructure. This book makes a valuable and critical contribution to smart assisted living research through the development of new effective, integrated, and interoperable SH solutions. It focuses on four underlying aspects: (1) Sensing and Monitoring Technologies; (2) Context Interference and Behaviour Analysis; (3) Personalisation and Adaptive Interaction, and (4) Open Smart Home and Service Infrastructures, demonstrating how fundamental theories, models and algorithms can be exploited to solve real-world problems. This comprehensive and timely book offers a unique and essential reference guide for policymakers, funding bodies, researchers, technology developers and managers, end users, carers, clinicians, healthcare service providers, educators and students, helping them adopt and implement smart assisted living systems.

Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia,... Privacy and Identity Management - 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21-23, 2020, Revised Selected Papers (Hardcover, 1st ed. 2021)
Michael Friedewald, Stefan Schiffner, Stephan Krenn
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives. *The summer school was held virtually.

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,203 Discovery Miles 12 030 Ships in 12 - 19 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Hardcover, 1st ed. 2021): Debahuti Mishra, Rajkumar... Intelligent and Cloud Computing - Proceedings of ICICC 2019, Volume 1 (Hardcover, 1st ed. 2021)
Debahuti Mishra, Rajkumar Buyya, Prasant Mohapatra, Srikanta Patnaik
R5,779 Discovery Miles 57 790 Ships in 10 - 15 working days

This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.

Deep Biometrics (Hardcover, 1st ed. 2020): Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger Deep Biometrics (Hardcover, 1st ed. 2020)
Richard Jiang, Chang-Tsun Li, Danny Crookes, Weizhi Meng, Christophe Rosenberger
R3,651 Discovery Miles 36 510 Ships in 10 - 15 working days

This book highlights new advances in biometrics using deep learning toward deeper and wider background, deeming it "Deep Biometrics". The book aims to highlight recent developments in biometrics using semi-supervised and unsupervised methods such as Deep Neural Networks, Deep Stacked Autoencoder, Convolutional Neural Networks, Generative Adversary Networks, and so on. The contributors demonstrate the power of deep learning techniques in the emerging new areas such as privacy and security issues, cancellable biometrics, soft biometrics, smart cities, big biometric data, biometric banking, medical biometrics, healthcare biometrics, and biometric genetics, etc. The goal of this volume is to summarize the recent advances in using Deep Learning in the area of biometric security and privacy toward deeper and wider applications. Highlights the impact of deep learning over the field of biometrics in a wide area; Exploits the deeper and wider background of biometrics, such as privacy versus security, biometric big data, biometric genetics, and biometric diagnosis, etc.; Introduces new biometric applications such as biometric banking, internet of things, cloud computing, and medical biometrics.

Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback): Jason Deckard Buffer Overflow Attacks - Detect, Exploit, Prevent (Paperback)
Jason Deckard
R888 Discovery Miles 8 880 Ships in 12 - 19 working days

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.
Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
*Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows.
*None of the current-best selling software security books focus exclusively on buffer overflows.
*This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

Configuring NetScreen Firewalls (Paperback): Rob Cameron Configuring NetScreen Firewalls (Paperback)
Rob Cameron
R878 Discovery Miles 8 780 Ships in 12 - 19 working days

The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security Manager. This book offers novice users a complete opportunity to learn the NetScreen firewall appliance. Advanced users will find it a rich technical resource.
* NetScreen is the #2 best-selling firewall appliance in the world (behind only Cisco PIX) and there are no competing books.
* Covers the materials found on the NetScreen NCSA 5.0 exam.
* Syngress firewall books are consistent best-sellers with market-leading books on ISA Server, Cisco PIX, and Check Point Next Generation.

Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
R4,931 Discovery Miles 49 310 Ships in 12 - 19 working days

This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.

AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback): Santana AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback)
Santana
R1,266 R1,158 Discovery Miles 11 580 Save R108 (9%) Ships in 12 - 19 working days

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics. Covers all AWS Certified Security Specialty exam topics Explains AWS cybersecurity techniques and incident response Covers logging and monitoring using the Amazon cloud Examines infrastructure security Describes access management and data protection With a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.

Recent Advances in Cryptography and Network Security (Hardcover): Pinaki Mitra Recent Advances in Cryptography and Network Security (Hardcover)
Pinaki Mitra
R2,762 Discovery Miles 27 620 Ships in 10 - 15 working days
Big Data Security (Hardcover): Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya Big Data Security (Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
R3,852 Discovery Miles 38 520 Ships in 12 - 19 working days

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,262 Discovery Miles 12 620 Ships in 12 - 19 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Technology Development for Security Practitioners (Hardcover, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Hardcover, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Game Theory for Cyber Deception - From Theory to Applications (Hardcover, 1st ed. 2021): Jeffrey Pawlick, Quanyan Zhu Game Theory for Cyber Deception - From Theory to Applications (Hardcover, 1st ed. 2021)
Jeffrey Pawlick, Quanyan Zhu
R3,124 Discovery Miles 31 240 Ships in 10 - 15 working days

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Semiotics of the Christian Imagination…
Domenico Pietropaolo Hardcover R3,897 Discovery Miles 38 970
Topics in Mathematical Analysis and…
Themistocles M. Rassias, Laszlo Toth Hardcover R4,525 Discovery Miles 45 250
The Sentence in Language and Cognition
Tista Bagchi Hardcover R2,875 R2,579 Discovery Miles 25 790
Introduction to Banach Spaces and…
Graham Allan Hardcover R2,876 Discovery Miles 28 760
Principles of Real Analysis
S.C. Malik Paperback R1,109 Discovery Miles 11 090
Real Analysis: Theory Of Measure And…
James J Yeh Paperback R2,302 Discovery Miles 23 020
Pseudolinear Functions and Optimization
Shashi Kant Mishra, Balendu Bhooshan Upadhyay Hardcover R4,948 Discovery Miles 49 480
Sensible - The Measure of Difference
Tappah Dinnall Hardcover R692 R609 Discovery Miles 6 090
Key Terms in Semantics
M Lynne Murphy, Anu Koskela Hardcover R5,259 Discovery Miles 52 590
Pragmatics and the English Language
Jonathan Culpeper, Michael Haugh Hardcover R3,560 Discovery Miles 35 600

 

Partners