0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (596)
  • R500+ (5,130)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback):... Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback)
Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
R1,559 R1,479 Discovery Miles 14 790 Save R80 (5%) Ships in 10 - 15 working days

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R3,802 Discovery Miles 38 020 Ships in 18 - 22 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Trusted Digital Circuits - Hardware Trojan Vulnerabilities, Prevention and Detection (Hardcover, 1st ed. 2018): Hassan Salmani Trusted Digital Circuits - Hardware Trojan Vulnerabilities, Prevention and Detection (Hardcover, 1st ed. 2018)
Hassan Salmani
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

Crime Prevention Technologies and Applications for Advancing Criminal Investigation (Hardcover, New): Chang-Tsun Li, Anthony... Crime Prevention Technologies and Applications for Advancing Criminal Investigation (Hardcover, New)
Chang-Tsun Li, Anthony T.S. Ho
R4,939 Discovery Miles 49 390 Ships in 18 - 22 working days

The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system. This book fosters a forum for advancing research and development of the theory and practice of digital crime prevention and forensics.

Analyzing Security, Trust, and Crime in the Digital World (Hardcover): Hamid R. Nemati Analyzing Security, Trust, and Crime in the Digital World (Hardcover)
Hamid R. Nemati
R4,837 Discovery Miles 48 370 Ships in 18 - 22 working days

In the digital era, information is the most valuable resource, and protecting one s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein."

Critical Infrastructure Security - Assessment, Prevention, Detection, Response (Hardcover): Francesco Flammini Critical Infrastructure Security - Assessment, Prevention, Detection, Response (Hardcover)
Francesco Flammini
R5,159 Discovery Miles 51 590 Ships in 10 - 15 working days

This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields: - Vulnerability analysis and risk assessment - Threat prevention, detection and response - Emergency planning and management Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.More specifically, the topic coverage of the book includes: - Historical background on threats to critical infrastructures - Model-based risk evaluation and management approaches - Security surveys and game-theoretic vulnerability assessment - Federated simulation for interdependency analysis - Security operator training and emergency preparedness - Intelligent multimedia (audio-video) surveillance - Terahertz body scanners for weapon and explosive detection - Security system design (intrusion detection / access control) - Dependability and resilience of computer networks (SCADA / cyber-security) - Wireless smart-sensor networks and structural health monitoring - Information systems for crisis response and emergency management - Early warning, situation awareness and decision support software

SNMP Mastery (Hardcover): Michael W Lucas SNMP Mastery (Hardcover)
Michael W Lucas
R896 R815 Discovery Miles 8 150 Save R81 (9%) Ships in 18 - 22 working days
Blockchain for 5G Healthcare Applications - Security and privacy solutions (Hardcover): Sudeep Tanwar Blockchain for 5G Healthcare Applications - Security and privacy solutions (Hardcover)
Sudeep Tanwar
R3,665 R3,305 Discovery Miles 33 050 Save R360 (10%) Ships in 18 - 22 working days

A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to achieve secure systems for Healthcare 4.0 using Blockchain, with emphasis on the key challenges of privacy and security. The book is organized into four sections. The first section is focused on 5G healthcare privacy and security concerns. The second section discusses healthcare architecture and emerging technologies. The third section covers the role of artificial intelligence for data security and privacy in 5G healthcare services. Finally, the last section systematically illustrates the adoption of blockchain in various applications of 5G healthcare. The book is essential reading for all involved in setting up, running, and maintaining healthcare information systems. Engineers, scientists, technologists, developers, designers, and researchers in healthcare technologies, health informatics, security, and information technology will find the content particularly useful.

Multibiometric Watermarking with Compressive Sensing Theory - Techniques and Applications (Hardcover, 1st ed. 2018): Rohit M.... Multibiometric Watermarking with Compressive Sensing Theory - Techniques and Applications (Hardcover, 1st ed. 2018)
Rohit M. Thanki, Vedvyas J. Dwivedi, Komal R. Borisagar
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.

Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed.... Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed. 2018)
Joceli Mayer, Paulo V.K. Borges, Steven J. Simske
R2,012 R1,787 Discovery Miles 17 870 Save R225 (11%) Ships in 10 - 15 working days

This book presents covert, semi-covert and overt techniques for communication over printed media by modifying images, texts or barcodes within the document. Basic and advanced techniques are discussed aimed to modulate information into images, texts and barcodes. Conveying information over printed media can be useful for content authentication, author copyright, information and piracy product deterrent, side information for marketing, among other applications. Practical issues are discussed and experiments are provided to evaluate competitive approaches for hard-copy communication. This book is a useful resource for researchers, practitioners and graduate students in the field of hard-copy communication by providing the fundamentals, basic and advanced techniques as examples of approaches to address the hard-copy media distortions and particularities.

The Networknomicon, or SNMP Mastery (Hardcover): Michael W Lucas, Abdul Alhazred The Networknomicon, or SNMP Mastery (Hardcover)
Michael W Lucas, Abdul Alhazred
R1,436 R1,247 Discovery Miles 12 470 Save R189 (13%) Ships in 18 - 22 working days
Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover)
Information R Management Association
R11,344 Discovery Miles 113 440 Ships in 18 - 22 working days
International Cybersecurity and Privacy Law in Practice (Hardcover, New edition): Charlotte A Tschider International Cybersecurity and Privacy Law in Practice (Hardcover, New edition)
Charlotte A Tschider
R5,222 Discovery Miles 52 220 Ships in 18 - 22 working days
De-mystifying the IPsec Puzzle (Hardcover): Shiela Frankel De-mystifying the IPsec Puzzle (Hardcover)
Shiela Frankel
R2,433 Discovery Miles 24 330 Ships in 18 - 22 working days

Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself. The book addresses IPsec's major aspects and components to help the reader evaluate and compare features of different implementations. It provides a detailed understanding of this cutting-edge technology from the inside, which enables the reader to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this resource collects all the current knowledge of IPsec and describes it in a literate, clear manner.

Face Recognition (Hardcover): Milos Oravec Face Recognition (Hardcover)
Milos Oravec
R3,613 Discovery Miles 36 130 Ships in 18 - 22 working days
Group-target Tracking (Hardcover, 1st ed. 2017): Wen-dong Geng, Yuan-qin Wang, Zheng-hong Dong Group-target Tracking (Hardcover, 1st ed. 2017)
Wen-dong Geng, Yuan-qin Wang, Zheng-hong Dong; Translated by Ge Geng, Fan Yang
R2,645 R2,470 Discovery Miles 24 700 Save R175 (7%) Ships in 10 - 15 working days

This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target. It specifies the tracking of the target in different quantities and densities. At the same time, it integrates cognition into the application. Group-target Tracking is designed as a book for advanced-level students and researchers in the area of radar systems, information fusion of multi-sensors and electronic countermeasures. It is also a valuable reference resource for professionals working in this field.

Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover): Maurice Dawson, Mohamed Eltayeb, Marwan Omar Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover)
Maurice Dawson, Mohamed Eltayeb, Marwan Omar
R5,374 Discovery Miles 53 740 Ships in 18 - 22 working days

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.

Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017): Nilanjan Dey, V. Santhi Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017)
Nilanjan Dey, V. Santhi
R4,903 Discovery Miles 49 030 Ships in 10 - 15 working days

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

Candidate Multilinear Maps (Hardcover): Sanjam Garg Candidate Multilinear Maps (Hardcover)
Sanjam Garg
R1,770 Discovery Miles 17 700 Ships in 18 - 22 working days

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more. In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.

Fundamentals of Network Security (Hardcover): John E. Canavan Fundamentals of Network Security (Hardcover)
John E. Canavan
R2,425 Discovery Miles 24 250 Ships in 18 - 22 working days

Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professionals to fundamental network security concepts, principles, and terms, while providing practical techniques that can be applied on the job. It helps identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.

Senior Cyber - Best Security Practices for Your Golden Years (Hardcover): Scott N Schober Senior Cyber - Best Security Practices for Your Golden Years (Hardcover)
Scott N Schober; As told to Craig W Schober
R689 R618 Discovery Miles 6 180 Save R71 (10%) Ships in 18 - 22 working days
Handbook of Software Engineering (Hardcover, 1st ed. 2019): Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang Handbook of Software Engineering (Hardcover, 1st ed. 2019)
Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang
R5,237 Discovery Miles 52 370 Ships in 18 - 22 working days

This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering, software architecture, software testing, formal methods, software maintenance) as well as emerging areas (e.g., self-adaptive systems, software engineering in the cloud, coordination technology). Each chapter includes an introduction to central concepts and principles, a guided tour of seminal papers and key contributions, and promising future research directions. The authors of the individual chapters are all acknowledged experts in their field and include many who have pioneered the techniques and technologies discussed. Readers will find an authoritative and concise review of each subject, and will also learn how software engineering technologies have evolved and are likely to develop in the years to come. This book will be especially useful for researchers who are new to software engineering, and for practitioners seeking to enhance their skills and knowledge.

Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020): Shishir K. Shandilya, Neal Wagner, Atulya... Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020)
Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Python Passive Network Mapping - P2NMAP (Paperback): Chet Hosmer Python Passive Network Mapping - P2NMAP (Paperback)
Chet Hosmer
R1,359 Discovery Miles 13 590 Ships in 10 - 15 working days

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in... Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in Hungary (Hardcover, 1st ed. 2016)
Laszlo Nadai, Jozsef Padanyi
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Food Powders - Processes and…
Bhesh Bhandari, Nidhi Bansal, … Hardcover R4,844 Discovery Miles 48 440
An Introduction to XML Query Processing…
Jiaheng Lu Hardcover R3,747 R3,446 Discovery Miles 34 460
Cases on Open-Linked Data and Semantic…
Patricia Ordonez De Pablos, Miltiadis D Lytras, … Hardcover R4,398 Discovery Miles 43 980
Graphical Thinking for Science and…
Anna Ursyn Hardcover R6,163 Discovery Miles 61 630
Elliptic Curves and Their Applications…
Andreas Enge Hardcover R5,916 Discovery Miles 59 160
Make Money Blogging - How to Start a…
James Ericson Hardcover R658 R587 Discovery Miles 5 870
Networks, Security and Complexity - The…
Sean P. Gorman Hardcover R2,340 Discovery Miles 23 400
Microbial Biotechnology in Food and…
Ramesh C. Ray Paperback R4,445 Discovery Miles 44 450
Analysis of Pesticide in Tea…
Guo-Fang Pang Hardcover R5,445 Discovery Miles 54 450
Olive Oil - Chemistry and Technology
Dimitrios Boskou Hardcover R2,509 Discovery Miles 25 090

 

Partners