0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,097)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Developing .Net Web Services With XML (Paperback): Syngress Developing .Net Web Services With XML (Paperback)
Syngress
R1,374 Discovery Miles 13 740 Ships in 10 - 15 working days

Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability.
Developing .Net Web Services with XML introduces readers to the foundation for the .Net platform. The book covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. Readers will be given a thorough introduction to .NET and its XML building blocks while acquiring a firm grasp of how those blocks can be used to build any Web site or service so that it will federate and collaborate seamlessly with others
.Equips developers with the tool necessary to take advantage of the next generation of the internet
.This book will provide web developers with a firm understanding of XML, the building block of the .Net framework
.Includes practical, real-life applications using XML
.Unrivalled web based support: Readers can receive up-to-the minute links, white papers and analysis for two years at [email protected]."

Multibiometric Watermarking with Compressive Sensing Theory - Techniques and Applications (Hardcover, 1st ed. 2018): Rohit M.... Multibiometric Watermarking with Compressive Sensing Theory - Techniques and Applications (Hardcover, 1st ed. 2018)
Rohit M. Thanki, Vedvyas J. Dwivedi, Komal R. Borisagar
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.

Blockchain for 5G Healthcare Applications - Security and privacy solutions (Hardcover): Sudeep Tanwar Blockchain for 5G Healthcare Applications - Security and privacy solutions (Hardcover)
Sudeep Tanwar
R3,665 R3,305 Discovery Miles 33 050 Save R360 (10%) Ships in 18 - 22 working days

A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to achieve secure systems for Healthcare 4.0 using Blockchain, with emphasis on the key challenges of privacy and security. The book is organized into four sections. The first section is focused on 5G healthcare privacy and security concerns. The second section discusses healthcare architecture and emerging technologies. The third section covers the role of artificial intelligence for data security and privacy in 5G healthcare services. Finally, the last section systematically illustrates the adoption of blockchain in various applications of 5G healthcare. The book is essential reading for all involved in setting up, running, and maintaining healthcare information systems. Engineers, scientists, technologists, developers, designers, and researchers in healthcare technologies, health informatics, security, and information technology will find the content particularly useful.

The Networknomicon, or SNMP Mastery (Hardcover): Michael W Lucas, Abdul Alhazred The Networknomicon, or SNMP Mastery (Hardcover)
Michael W Lucas, Abdul Alhazred
R1,436 R1,247 Discovery Miles 12 470 Save R189 (13%) Ships in 18 - 22 working days
CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback): Ip... CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback)
Ip Specialist
R510 Discovery Miles 5 100 Ships in 10 - 15 working days
International Cybersecurity and Privacy Law in Practice (Hardcover, New edition): Charlotte A Tschider International Cybersecurity and Privacy Law in Practice (Hardcover, New edition)
Charlotte A Tschider
R5,222 Discovery Miles 52 220 Ships in 18 - 22 working days
Glass Houses - Privacy, Secrecy, and Cyber Insecurity in a Transparent World (Paperback): Joel Brenner Glass Houses - Privacy, Secrecy, and Cyber Insecurity in a Transparent World (Paperback)
Joel Brenner
R519 Discovery Miles 5 190 Ships in 18 - 22 working days

A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Like the rest of us, governments and corporations inhabit "glass houses," all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can--and cannot--do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.

Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed.... Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed. 2018)
Joceli Mayer, Paulo V.K. Borges, Steven J. Simske
R2,012 R1,787 Discovery Miles 17 870 Save R225 (11%) Ships in 10 - 15 working days

This book presents covert, semi-covert and overt techniques for communication over printed media by modifying images, texts or barcodes within the document. Basic and advanced techniques are discussed aimed to modulate information into images, texts and barcodes. Conveying information over printed media can be useful for content authentication, author copyright, information and piracy product deterrent, side information for marketing, among other applications. Practical issues are discussed and experiments are provided to evaluate competitive approaches for hard-copy communication. This book is a useful resource for researchers, practitioners and graduate students in the field of hard-copy communication by providing the fundamentals, basic and advanced techniques as examples of approaches to address the hard-copy media distortions and particularities.

De-mystifying the IPsec Puzzle (Hardcover): Shiela Frankel De-mystifying the IPsec Puzzle (Hardcover)
Shiela Frankel
R2,433 Discovery Miles 24 330 Ships in 18 - 22 working days

Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself. The book addresses IPsec's major aspects and components to help the reader evaluate and compare features of different implementations. It provides a detailed understanding of this cutting-edge technology from the inside, which enables the reader to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this resource collects all the current knowledge of IPsec and describes it in a literate, clear manner.

Hack Proofing ColdFusion (Paperback): Syngress Hack Proofing ColdFusion (Paperback)
Syngress
R1,286 Discovery Miles 12 860 Ships in 10 - 15 working days

The only way to stop a hacker is to think like one
ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance.
Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches.
Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications.
.Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker
.Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion
.Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at [email protected]"

Face Recognition (Hardcover): Milos Oravec Face Recognition (Hardcover)
Milos Oravec
R3,613 Discovery Miles 36 130 Ships in 18 - 22 working days
Candidate Multilinear Maps (Hardcover): Sanjam Garg Candidate Multilinear Maps (Hardcover)
Sanjam Garg
R1,770 Discovery Miles 17 700 Ships in 18 - 22 working days

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more. In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.

Fundamentals of Smart Contract Security (Paperback): Richard Ma, Jan Gorzny, Edward Zulkoski Fundamentals of Smart Contract Security (Paperback)
Richard Ma, Jan Gorzny, Edward Zulkoski
R1,048 R876 Discovery Miles 8 760 Save R172 (16%) Ships in 18 - 22 working days
Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover): Michelle Moore Cybersecurity Breaches and Issues Surrounding Online Threat Protection (Hardcover)
Michelle Moore
R4,916 Discovery Miles 49 160 Ships in 18 - 22 working days

Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.

Principles of Security and Trust (Hardcover): David Sands, Flemming Nielson Principles of Security and Trust (Hardcover)
David Sands, Flemming Nielson
R1,427 Discovery Miles 14 270 Ships in 18 - 22 working days
Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017): Nilanjan Dey, V. Santhi Intelligent Techniques in Signal Processing for Multimedia Security (Hardcover, 1st ed. 2017)
Nilanjan Dey, V. Santhi
R4,903 Discovery Miles 49 030 Ships in 10 - 15 working days

This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications' algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face conditions, and three-dimensional face identification using the approach developed here. This book equips perception technology professionals with the latest technologies, techniques, and strategies for multimedia security systems, offering a valuable resource for engineers and researchers working to develop security systems.

Fundamentals of Network Security (Hardcover): John E. Canavan Fundamentals of Network Security (Hardcover)
John E. Canavan
R2,425 Discovery Miles 24 250 Ships in 18 - 22 working days

Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professionals to fundamental network security concepts, principles, and terms, while providing practical techniques that can be applied on the job. It helps identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.

Senior Cyber - Best Security Practices for Your Golden Years (Hardcover): Scott N Schober Senior Cyber - Best Security Practices for Your Golden Years (Hardcover)
Scott N Schober; As told to Craig W Schober
R689 R618 Discovery Miles 6 180 Save R71 (10%) Ships in 18 - 22 working days
Group-target Tracking (Hardcover, 1st ed. 2017): Wen-dong Geng, Yuan-qin Wang, Zheng-hong Dong Group-target Tracking (Hardcover, 1st ed. 2017)
Wen-dong Geng, Yuan-qin Wang, Zheng-hong Dong; Translated by Ge Geng, Fan Yang
R2,645 R2,470 Discovery Miles 24 700 Save R175 (7%) Ships in 10 - 15 working days

This book describes grouping detection and initiation; group initiation algorithm based on geometry center; data association and track continuity; as well as separate-detection and situation cognition for group-target. It specifies the tracking of the target in different quantities and densities. At the same time, it integrates cognition into the application. Group-target Tracking is designed as a book for advanced-level students and researchers in the area of radar systems, information fusion of multi-sensors and electronic countermeasures. It is also a valuable reference resource for professionals working in this field.

Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019): N. Jeyanthi, Ajith Abraham, Hamid Mcheick Ubiquitous Computing and Computing Security of IoT (Hardcover, 1st ed. 2019)
N. Jeyanthi, Ajith Abraham, Hamid Mcheick
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Handbook of Software Engineering (Hardcover, 1st ed. 2019): Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang Handbook of Software Engineering (Hardcover, 1st ed. 2019)
Sungdeok Cha, Richard N. Taylor, Kyo-Chul Kang
R5,237 Discovery Miles 52 370 Ships in 18 - 22 working days

This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering, software architecture, software testing, formal methods, software maintenance) as well as emerging areas (e.g., self-adaptive systems, software engineering in the cloud, coordination technology). Each chapter includes an introduction to central concepts and principles, a guided tour of seminal papers and key contributions, and promising future research directions. The authors of the individual chapters are all acknowledged experts in their field and include many who have pioneered the techniques and technologies discussed. Readers will find an authoritative and concise review of each subject, and will also learn how software engineering technologies have evolved and are likely to develop in the years to come. This book will be especially useful for researchers who are new to software engineering, and for practitioners seeking to enhance their skills and knowledge.

Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020): Shishir K. Shandilya, Neal Wagner, Atulya... Advances in Cyber Security Analytics and Decision Systems (Hardcover, 1st ed. 2020)
Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.

Security and Privacy in Smart Sensor Networks (Hardcover): Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui Security and Privacy in Smart Sensor Networks (Hardcover)
Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui
R5,399 Discovery Miles 53 990 Ships in 18 - 22 working days

Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providing new models, practical solutions, and technological advances related to security. Featuring coverage on a broad range of topics such as cloud security, encryption, and intrusion detection systems, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on authentication and intrusion detection.

Python Passive Network Mapping - P2NMAP (Paperback): Chet Hosmer Python Passive Network Mapping - P2NMAP (Paperback)
Chet Hosmer
R1,359 Discovery Miles 13 590 Ships in 10 - 15 working days

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019): Song Guo, Deze Zeng Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019)
Song Guo, Deze Zeng
R3,805 Discovery Miles 38 050 Ships in 18 - 22 working days

This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements. Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Cybersecurity Crisis Management and…
Ryma Abassi, Aida Ben Chehida Douss Hardcover R5,931 Discovery Miles 59 310
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R7,962 Discovery Miles 79 620
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,311 Discovery Miles 73 110
Advanced Technologies of Quantum Key…
Sergiy Gnatyuk Hardcover R3,089 Discovery Miles 30 890
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Cybersecurity 2021
Carl Freeman Hardcover R1,039 R877 Discovery Miles 8 770

 

Partners