0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (250)
  • R250 - R500 (595)
  • R500+ (5,549)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,670 Discovery Miles 16 700 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Artificial Intelligence in a Throughput Model - Some Major Algorithms (Paperback): Waymond Rodgers Artificial Intelligence in a Throughput Model - Some Major Algorithms (Paperback)
Waymond Rodgers
R2,156 Discovery Miles 21 560 Ships in 12 - 17 working days

Physical and behavioral biometric technologies such as fingerprinting, facial recognition, voice identification, etc. have enhanced the level of security substantially in recent years. Governments and corporates have employed these technologies to achieve better customer satisfaction. However, biometrics faces major challenges in reducing criminal, terrorist activities and electronic frauds, especially in choosing appropriate decision-making algorithms. To face this challenge, new developments have been made, that amalgamate biometrics with artificial intelligence (AI) in decision-making modeling. Advanced software algorithms of AI, processing information offered by biometric technology, achieve better results. This has led to growth in the biometrics technology industry, and is set to increase the security and internal control operations manifold. This book provides an overview of the existing biometric technologies, decision-making algorithms and the growth opportunity in biometrics. The book proposes a throughput model, which draws on computer science, economics and psychology to model perceptual, informational sources, judgmental processes and decision choice algorithms. It reviews how biometrics might be applied to reduce risks to individuals and organizations, especially when dealing with digital-based media.

Assessing and Insuring Cybersecurity Risk (Hardcover): Ravi Das Assessing and Insuring Cybersecurity Risk (Hardcover)
Ravi Das
R4,434 Discovery Miles 44 340 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Designing Secure Systems (Hardcover): Michael Melone Designing Secure Systems (Hardcover)
Michael Melone
R2,109 Discovery Miles 21 090 Ships in 12 - 17 working days

Modern systems are an intertwined mesh of human process, physical security, and technology. Attackers are aware of this, commonly leveraging a weakness in one form of security to gain control over an otherwise protected operation. To expose these weaknesses, we need a single unified model that can be used to describe all aspects of the system on equal terms. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems - from padlocks, to phishing, to enterprise software architecture. We discuss how weakness in one part of a system creates vulnerability in another, all the while applying standards and frameworks used in the cybersecurity world. Our goal: to analyze the security of the entire system - including people, processes, and technology - using a single model. We begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. Lastly, we discuss how to operate a secure system based on the NIST Cybersecurity Framework (CSF) concepts of "identify, protect, detect, respond, and recover." Other topics covered in this book include the NIST National Vulnerability Database (NVD), MITRE Common Vulnerability Scoring System (CVSS), Microsoft's Security Development Lifecycle (SDL), and the MITRE ATT&CK Framework.

Campus Emergency Preparedness - Meeting ICS and NIMS Compliance (Paperback): Maureen Connolly Campus Emergency Preparedness - Meeting ICS and NIMS Compliance (Paperback)
Maureen Connolly
R1,087 Discovery Miles 10 870 Ships in 12 - 17 working days

An easily digestible guide, Campus Emergency Preparedness: Meeting ICS and NIMS Compliance helps you develop and organize emergency operation plans. It incorporates the key components recommended by the Federal Emergency Management Agency (FEMA) and the US Department of Education and outlines the roles and responsibilities of campus personnel before, during, and after an emergency. Events covered include chemical spills, toxic gas releases, terrorist attacks, active shooter events, pandemics, floods, hurricanes, tornados, fires, and other natural or man-made hazards. The information in this book is extracted from FEMA and US Department of Education documents and training, as well as concepts and strategies from a cross-section of college and university emergency plans. These resources have been melded together to provide you with strategies for protecting, preventing, mitigating, responding, and recovering from threats and hazards that may occur at an institute of higher education. The book aids you in creating emergency response plans that comply with standards set by the ICS and NIMS. Ultimately, these are all-hazards strategies that can be applied to all phases of campus emergency management with efficient coordination among all levels of campus administration. Safety in higher education institution campuses is a critical issue today in the wake of several events in recent years. Campus Emergency Preparedness helps you work toward creating a campus environment that is as safe as possible for your students, faculty, and staff. It is a valuable source for anticipating and handling a broad range of emergencies.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,578 Discovery Miles 15 780 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Hardcover, 3rd edition):... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Hardcover, 3rd edition)
Douglas Landoll
R4,036 Discovery Miles 40 360 Ships in 12 - 17 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

Cyber Forensics - Examining Emerging and Hybrid Technologies (Hardcover): Albert J. Marcella Cyber Forensics - Examining Emerging and Hybrid Technologies (Hardcover)
Albert J. Marcella
R3,270 Discovery Miles 32 700 Ships in 12 - 17 working days

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R2,076 Discovery Miles 20 760 Ships in 12 - 17 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

Securing India in the Cyber Era (Hardcover): Sameer Patil Securing India in the Cyber Era (Hardcover)
Sameer Patil
R1,604 Discovery Miles 16 040 Ships in 12 - 17 working days

This book explores the geopolitics of the global cyber space to analyse India's cyber security landscape. As conflicts go more online, nation-states are manipulating the cyber space to exploit each other's dependence on information, communication and digital technologies. All the major powers have dedicated cyber units to breach computer networks, harvest sensitive data and proprietary information, and disrupt critical national infrastructure operations. This volume reviews threats to Indian computer networks, analyses the country's policy responses to these threats, and suggests comprehensive measures to build resilience in the system. India constitutes the second largest internet user base in the world, and this expansion of the user base also saw an accompanying rise in cyber crimes. The book discusses how the country can protect this user base, the data-dependent critical infrastructure, build resilient digital payment systems, and answer the challenges of the dark net. It also explores India's cyber diplomacy, as an emerging economy with a large IT industry and a well-established technological base. Topical and lucid, this book as part of The Gateway House Guide to India in the 2020s series, will be of interest to scholars and researchers of cyber security, digital diplomacy, foreign policy, international relations, geopolitics, strategic affairs, defence studies, South Asian politics and international politics.

It's Your Digital Life (Paperback): Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan It's Your Digital Life (Paperback)
Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan
R1,461 Discovery Miles 14 610 Ships in 12 - 17 working days

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

It's Your Digital Life (Hardcover): Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan It's Your Digital Life (Hardcover)
Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan
R3,250 Discovery Miles 32 500 Ships in 12 - 17 working days

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R3,994 Discovery Miles 39 940 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

CISM Certified Information Security Manager Study Guide (Paperback): M. Chapple CISM Certified Information Security Manager Study Guide (Paperback)
M. Chapple
R1,122 Discovery Miles 11 220 Ships in 12 - 17 working days

Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide As cybersecurity becomes an increasingly mission-critical issue, more and more employers and professionals are turning to ISACA's trusted and recognized Certified Information Security Manager qualification as a tried-and-true indicator of information security management expertise. In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further. Sharpen your skills with Exam Essentials and chapter review questions with detailed explanations in all four of the CISM exam domains: Information Security Governance, Information Security Risk Management, Information Security Program, and Incident Management. In this essential resource, you'll also: Grab a head start to an in-demand certification used across the information security industry Expand your career opportunities to include rewarding and challenging new roles only accessible to those with a CISM credential Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone prepping for the challenging CISM exam or looking for a new role in the information security field, the Certified Information Security Manager (CISM) Study Guide is an indispensable resource that will put you on the fast track to success on the test and in your next job.

Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover): Chinmay Chakraborty, Sree Ranjani... Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover)
Chinmay Chakraborty, Sree Ranjani Rajendran, Muhammad Habibur Rehman
R4,606 Discovery Miles 46 060 Ships in 12 - 17 working days

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover):... Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover)
Bruce Turner
R2,060 Discovery Miles 20 600 Ships in 12 - 17 working days

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Secure Edge Computing - Applications, Techniques and Challenges (Hardcover): Mohiuddin Ahmed, Paul Haskell-Dowland Secure Edge Computing - Applications, Techniques and Challenges (Hardcover)
Mohiuddin Ahmed, Paul Haskell-Dowland
R3,106 Discovery Miles 31 060 Ships in 12 - 17 working days

This book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. The book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.

Artificial Intelligence for Business Optimization - Research and Applications (Hardcover): Bhuvan Unhelkar, Tad Gonsalves Artificial Intelligence for Business Optimization - Research and Applications (Hardcover)
Bhuvan Unhelkar, Tad Gonsalves
R2,576 Discovery Miles 25 760 Ships in 12 - 17 working days

This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit. By considering business strategies, business process modeling, quality assurance, cybersecurity, governance and big data and focusing on functions, processes, and people's behaviors it helps businesses take a truly holistic approach to business optimization. It contains practical examples that make it easy to understand the concepts and apply them. It is written for practitioners (consultants, senior executives, decision-makers) dealing with real-life business problems on a daily basis, who are keen to develop systematic strategies for the application of AI/ML/BD technologies to business automation and optimization, as well as researchers who want to explore the industrial applications of AI and higher-level students.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,949 Discovery Miles 19 490 Ships in 9 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Practitioner's Guide to Business Impact Analysis (Paperback): Priti Sikdar Practitioner's Guide to Business Impact Analysis (Paperback)
Priti Sikdar
R1,301 Discovery Miles 13 010 Ships in 12 - 17 working days

This book illustrates the importance of business impact analysis, which covers risk assessment, and moves towards better understanding of the business environment, industry specific compliance, legal and regulatory landscape and the need for business continuity. The book provides charts, checklists and flow diagrams that give the roadmap to collect, collate and analyze data, and give enterprise management the entire mapping for controls that comprehensively covers all compliance that the enterprise is subject to have. The book helps professionals build a control framework tailored for an enterprise that covers best practices and relevant standards applicable to the enterprise. Presents a practical approach to assessing security, performance and business continuity needs of the enterprise Helps readers understand common objectives for audit, compliance, internal/external audit and assurance. Demonstrates how to build a customized controls framework that fulfills common audit criteria, business resilience needs and internal monitoring for effectiveness of controls Presents an Integrated Audit approach to fulfill all compliance requirements

Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Paperback): James Bone Cognitive Hack - The New Battleground in Cybersecurity ... the Human Mind (Paperback)
James Bone
R1,257 Discovery Miles 12 570 Ships in 12 - 17 working days

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.

Security and Auditing of Smart Devices - Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Paperback):... Security and Auditing of Smart Devices - Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Paperback)
Sajay Rai, Philip Chukwuma, Richard Cozart
R1,259 Discovery Miles 12 590 Ships in 12 - 17 working days

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.

The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Hardcover):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Hardcover)
Te Wu
R4,156 Discovery Miles 41 560 Ships in 12 - 17 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

CISSP For Dummies 7e (Paperback, 7th Edition): L.C. Miller CISSP For Dummies 7e (Paperback, 7th Edition)
L.C. Miller
R942 R672 Discovery Miles 6 720 Save R270 (29%) Ships in 9 - 15 working days

Get CISSP certified, with this comprehensive study plan! Revised for the updated 2021 exam, CISSP For Dummies is packed with everything you need to succeed on test day. With deep content review on every domain, plenty of practice questions, and online study tools, this book helps aspiring security professionals unlock the door to success on this high-stakes exam. This book, written by CISSP experts, goes beyond the exam material and includes tips on setting up a 60-day study plan, exam-day advice, and access to an online test bank of questions. Make your test day stress-free with CISSP For Dummies! Review every last detail you need to pass the CISSP certification exam Master all 8 test domains, from Security and Risk Management through Software Development Security Get familiar with the 2021 test outline Boost your performance with an online test bank, digital flash cards, and test-day tips If you're a security professional seeking your CISSP certification, this book is your secret weapon as you prepare for the exam.

Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (Hardcover): Anand Handa, Rohit Negi,... Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (Hardcover)
Anand Handa, Rohit Negi, Sandeep Kumar Shukla
R2,940 Discovery Miles 29 400 Ships in 12 - 17 working days

Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The Editors have developed multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. This book has 8 chapters describing these projects in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. This book also demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,347 Discovery Miles 13 470
Wireless Security Architecture…
J Minella Paperback R913 Discovery Miles 9 130
Applications of Blockchain and Big IoT…
Arun Solanki, Vishal Jain, … Hardcover R4,468 Discovery Miles 44 680
(ISC)2 CCSP Certified Cloud Security…
M. Chapple Paperback R1,126 Discovery Miles 11 260
Networks, Security and Complexity - The…
Sean P. Gorman Hardcover R2,902 Discovery Miles 29 020
Hacking For Dummies, 7th Edition
K Beaver Paperback R555 Discovery Miles 5 550
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,124 R907 Discovery Miles 9 070
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360
8 Steps to Better Security - A Simple…
K Crawley Paperback R534 Discovery Miles 5 340

 

Partners