0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (255)
  • R250 - R500 (575)
  • R500+ (5,285)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,582 Discovery Miles 75 820 Ships in 12 - 17 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Discrete Password Logbook - Kitty Cats Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Kitty Cats Edition (Hardcover)
Suzeteo Enterprises
R522 Discovery Miles 5 220 Ships in 10 - 15 working days
Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,541 Discovery Miles 25 410 Ships in 12 - 17 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fourth International Symposium on... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) (Hardcover, 1st ed. 2020)
Yang Xu, Yongbin Sun, Yanyang Liu, Yanjun Wang, Pengfei Gu, …
R4,511 Discovery Miles 45 110 Ships in 12 - 17 working days

This book presents a compilation of selected papers from the Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in August 2019 in Guiyang, China. The purpose of the symposium was to discuss inspection, testing, certification and research concerning the software and hardware of instrument and control (I&C) systems used at nuclear power plants (NPP), such as sensors, actuators and control systems. The event provides a venue for exchange among experts, scholars and nuclear power practitioners, as well as a platform for the combination of teaching and research at universities and enterprises to promote the safe development of nuclear power plants. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.

From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019): Panagiotis Karampelas, Jalal... From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019)
Panagiotis Karampelas, Jalal Kawash, Tansel Ozyer
R4,136 Discovery Miles 41 360 Ships in 12 - 17 working days

This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.

Research Anthology on Securing Medical Systems and Records, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 1 (Hardcover)
Information R Management Association
R12,522 Discovery Miles 125 220 Ships in 12 - 17 working days
Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover): Ganesh Chandra Deka, Sambit... Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover)
Ganesh Chandra Deka, Sambit Bakshi
R9,191 Discovery Miles 91 910 Ships in 12 - 17 working days

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover): Jean-Loup Richet Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover)
Jean-Loup Richet
R6,714 Discovery Miles 67 140 Ships in 12 - 17 working days

Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R5,377 Discovery Miles 53 770 Ships in 12 - 17 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Quantum Cryptography - From Key Distribution to Conference Key Agreement (Hardcover, 1st ed. 2021): Federico Grasselli Quantum Cryptography - From Key Distribution to Conference Key Agreement (Hardcover, 1st ed. 2021)
Federico Grasselli
R3,794 Discovery Miles 37 940 Ships in 12 - 17 working days

Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most extensively implemented protocol is quantum key distribution (QKD), which enables secure communication between two users. The aim of this book is to introduce the reader to state-of-the-art QKD and illustrate its recent multi-user generalization: quantum conference key agreement. With its pedagogical approach that doesn't disdain going into details, the book enables the reader to join in cutting-edge research on quantum cryptography.

Economics of Information Security (Hardcover, 2004 ed.): L. Jean Camp, Stephen Lewis Economics of Information Security (Hardcover, 2004 ed.)
L. Jean Camp, Stephen Lewis
R4,536 Discovery Miles 45 360 Ships in 12 - 17 working days

Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

Information Security Management (Hardcover): Fiona Hobbs Information Security Management (Hardcover)
Fiona Hobbs
R3,169 Discovery Miles 31 690 Ships in 12 - 17 working days
Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and... Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and Cyber threats (Hardcover, 1st ed. 2018)
Andrea Malizia, Marco D'Arienzo
R3,011 Discovery Miles 30 110 Ships in 10 - 15 working days

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Weaponizing Cyberspace - Inside Russia's Hostile Activities (Hardcover): Nicholas Michael Sambaluk Weaponizing Cyberspace - Inside Russia's Hostile Activities (Hardcover)
Nicholas Michael Sambaluk
R2,589 Discovery Miles 25 890 Ships in 12 - 17 working days

The Russian regime's struggle for internal control drives multifaceted actions in cyberspace that do not stop at national borders. Cybercrime, technical hacking, and disinformation are complementary tools to preserve national power internally while projecting effects onto myriad neighbors and rivals. Russian activity in the cyber domain is infamous in the United States and other Western countries. Weaponizing Cyberspace explores the Russian proclivity, particularly in the 21st century, for using cyberspace as an environment in which to launch technical attacks and disinformation campaigns that sow chaos and distraction in ways that provide short-term advantage to autocrats in the Kremlin. Arguing that Russia's goal is to divide people, Sambaluk explains that Russia's modus operandi in disinformation campaigning is specifically to find and exploit existing sore spots in other countries. In the U.S., this often means inflaming political tensions among people on the far left and far right. Russia's actions have taken different forms, including the sophisticated surveillance and sabotage of critical infrastructure, the ransoming of data by criminal groups, and a welter of often mutually contradictory disinformation messages that pollute online discourse within and beyond Russia. Whether deployed to contribute to hybrid war or to psychological fracture and disillusionment in targeted societies, the threat is real and must be understood and effectively addressed. Explains how the legacy of Soviet information operations and the modern examples of Russian information operations are similar but not identical to one another Explores the development of Russian domestic information operations techniques that can now be applied against foreign powers Describes the relationships between technical attacks and disinformation often used in confrontations with countries along Russia's borders Examines the role of Russian information operations in U.S. social and political discourse Considers the implications of other countries' reactions that attempt to eliminate the Russian information operation's ability to influence society

VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019): Shojiro Asai VLSI Design and Test for Systems Dependability (Hardcover, 1st ed. 2019)
Shojiro Asai
R6,655 Discovery Miles 66 550 Ships in 10 - 15 working days

This book discusses the new roles that the VLSI (very-large-scale integration of semiconductor circuits) is taking for the safe, secure, and dependable design and operation of electronic systems. The book consists of three parts. Part I, as a general introduction to this vital topic, describes how electronic systems are designed and tested with particular emphasis on dependability engineering, where the simultaneous assessment of the detrimental outcome of failures and cost of their containment is made. This section also describes the related research project "Dependable VLSI Systems," in which the editor and authors of the book were involved for 8 years. Part II addresses various threats to the dependability of VLSIs as key systems components, including time-dependent degradations, variations in device characteristics, ionizing radiation, electromagnetic interference, design errors, and tampering, with discussion of technologies to counter those threats. Part III elaborates on the design and test technologies for dependability in such applications as control of robots and vehicles, data processing, and storage in a cloud environment and heterogeneous wireless telecommunications. This book is intended to be used as a reference for engineers who work on the design and testing of VLSI systems with particular attention to dependability. It can be used as a textbook in graduate courses as well. Readers interested in dependable systems from social and industrial-economic perspectives will also benefit from the discussions in this book.

Smart Log Data Analytics - Techniques for Advanced Security Analysis (Hardcover, 1st ed. 2021): Florian Skopik, Markus... Smart Log Data Analytics - Techniques for Advanced Security Analysis (Hardcover, 1st ed. 2021)
Florian Skopik, Markus Wurzenberger, Max Landauer
R4,134 Discovery Miles 41 340 Ships in 12 - 17 working days

This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.

Internet of Things Security and Data Protection (Hardcover, 1st ed. 2019): Sebastien Ziegler Internet of Things Security and Data Protection (Hardcover, 1st ed. 2019)
Sebastien Ziegler
R4,808 Discovery Miles 48 080 Ships in 12 - 17 working days

This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.

Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and... Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and Migration - With a Foreword by Lourdes Arizpe Schlosser and a Preface by Hans Gunter Brauch (Hardcover, 1st ed. 2020)
Ursula Oswald Spring
R4,186 Discovery Miles 41 860 Ships in 12 - 17 working days

Earth at Risk in the 21st Century offers critical interdisciplinary reflections on peace, security, gender relations, migration and the environment, all of which are threatened by climate change, with women and children affected most. Deep-rooted gender discrimination is also a result of the destructive exploitation of natural resources and the pollution of soils, water, biota and air. In the Anthropocene, the management of human society and global resources has become unsustainable and has created multiple conflicts by increasing survival threats primarily for poor people in the Global South. Alternative approaches to peace and security, focusing from bottom-up on an engendered peace with sustainability, may help society and the environment to be managed in the highly fragile natural conditions of a 'hothouse Earth'. Thus, the book explores systemic alternatives based on indigenous wisdom, gift economy and the economy of solidarity, in which an alternative cosmovision fosters mutual care between humankind and nature. * Special analysis of risks to the survival of humankind in the 21st century. * Interdisciplinary studies on peace, security, gender and environment related to global environmental and climate change. * Critical reflections on gender relations, peace, security, migration and the environment * Systematic analysis of food, water, health, energy security and its nexus. * Alternative proposals from the Global South with indigenous wisdom for saving Mother Earth.

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover): S Geetha, Asnath Victy... Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover)
S Geetha, Asnath Victy Phamila
R6,163 Discovery Miles 61 630 Ships in 12 - 17 working days

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020): Shiho Kim, Ganesh Chandra Deka Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020)
Shiho Kim, Ganesh Chandra Deka
R4,813 Discovery Miles 48 130 Ships in 12 - 17 working days

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.

Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R642 Discovery Miles 6 420 Ships in 10 - 15 working days
SNMP Mastery (Hardcover): Michael W Lucas SNMP Mastery (Hardcover)
Michael W Lucas
R999 R879 Discovery Miles 8 790 Save R120 (12%) Ships in 10 - 15 working days
Cyber Resilience of Systems and Networks (Hardcover, 1st ed. 2019): Alexander Kott, Igor Linkov Cyber Resilience of Systems and Networks (Hardcover, 1st ed. 2019)
Alexander Kott, Igor Linkov
R5,316 Discovery Miles 53 160 Ships in 12 - 17 working days

This book introduces fundamental concepts of cyber resilience, drawing expertise from academia, industry, and government. Resilience is defined as the ability to recover from or easily adjust to shocks and stresses. Unlike the concept of security - which is often and incorrectly conflated with resilience -- resilience refers to the system's ability to recover or regenerate its performance after an unexpected impact produces a degradation in its performance. A clear understanding of distinction between security, risk and resilience is important for developing appropriate management of cyber threats. The book presents insightful discussion of the most current technical issues in cyber resilience, along with relevant methods and procedures. Practical aspects of current cyber resilience practices and techniques are described as they are now, and as they are likely to remain in the near term. The bulk of the material is presented in the book in a way that is easily accessible to non-specialists. Logical, consistent, and continuous discourse covering all key topics relevant to the field will be of use as teaching material as well as source of emerging scholarship in the field. A typical chapter provides introductory, tutorial-like material, detailed examples, in-depth elaboration of a selected technical approach, and a concise summary of key ideas.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,930 Discovery Miles 59 300 Ships in 12 - 17 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

Information Security in Diverse Computing Environments (Hardcover): Anne V. D. M. Kayem, Christoph Meinel Information Security in Diverse Computing Environments (Hardcover)
Anne V. D. M. Kayem, Christoph Meinel
R6,740 Discovery Miles 67 400 Ships in 12 - 17 working days

Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,317 Discovery Miles 13 170
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia Paperback R2,361 Discovery Miles 23 610
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R972 R853 Discovery Miles 8 530
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R523 Discovery Miles 5 230
Ethical Hacking for Beginners - How to…
Attila Kovacs Hardcover R866 R730 Discovery Miles 7 300
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R12,704 Discovery Miles 127 040
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R7,113 R6,566 Discovery Miles 65 660

 

Partners