0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (262)
  • R250 - R500 (602)
  • R500+ (5,514)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Unmanned Aircraft Systems Traffic Management - UTM (Hardcover): Michael S. Baum Unmanned Aircraft Systems Traffic Management - UTM (Hardcover)
Michael S. Baum
R2,658 Discovery Miles 26 580 Ships in 12 - 17 working days

This book introduces unmanned aircraft systems traffic management (UTM) and how this new paradigm in traffic management integrates unmanned aircraft operations into national airspace systems. Exploring how UTM is expected to operate, including possible architectures for UTM implementations, and UTM services, including flight planning, strategic coordination, and conformance monitoring, Unmanned Aircraft Systems Traffic Management: UTM considers the boundaries of UTM and how it is expected to interlace with tactical coordination systems to maintain airspace safety. The book also presents the work of the global ecosystem of players advancing UTM, including relevant standards development organizations (SDOs), and considers UTM governance paradigms and challenges. FEATURES Describes UTM concept of operations (ConOps) and global variations in architectures Explores envisioned UTM services, including flight planning, strategic coordination, conformance monitoring, contingency management, constraints and geo-awareness, and remote identification Highlights cybersecurity standards development and awareness Covers approaches to the approval, management, and oversight of UTM components and ecosystem Considers the future of UTM and potential barriers to its success, international coordination, and regulatory reform This book is an essential, in-depth, annotated resource for developers, unmanned aircraft system operators, pilots, policy makers, researchers, and academics engaged in unmanned systems, transportation management, and the future of aviation.

IoT Applications, Security Threats, and Countermeasures (Hardcover): Padmalaya Nayak, Niranjan Ray, P Ravichandran IoT Applications, Security Threats, and Countermeasures (Hardcover)
Padmalaya Nayak, Niranjan Ray, P Ravichandran
R4,499 Discovery Miles 44 990 Ships in 12 - 17 working days

The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog computing, real-time solar energy monitoring, healthcare, and agriculture. Fundamental concepts of gathering, processing, and analyzing different Artificial Intelligence (AI) models in IoT applications are covered along with recent detection mechanisms for different types of attacks for effective network communication. On par with the standards laid out by international organizations in related fields, the book focuses on both core concepts of IoT along with major application areas. Designed for technical developers, academicians, data scientists, industrial researchers, professionals, and students, this book is useful in uncovering the latest innovations in the field of IoT.

The Insider Threat - Assessment and Mitigation of Risks (Paperback): Eleanor E. Thompson The Insider Threat - Assessment and Mitigation of Risks (Paperback)
Eleanor E. Thompson
R1,355 Discovery Miles 13 550 Ships in 12 - 17 working days

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This practical organizational security management approach examines multiple aspects of security to protect against physical, cyber, and human risk. A practical more tactical focus includes managing vulnerabilities and applying countermeasures. The book guides readers to a greater depth of understanding and action-oriented options.

Optimal Spending on Cybersecurity Measures - Risk Management (Hardcover): Tara Kissoon Optimal Spending on Cybersecurity Measures - Risk Management (Hardcover)
Tara Kissoon
R1,562 Discovery Miles 15 620 Ships in 12 - 17 working days

This book explores the strategic decisions made by organizations when implementing cybersecurity controls and leveraging economic models and theories from the economics of information security and risk-management frameworks. Based on unique and distinct research completed within the field of risk-management and information security, this book provides insight into organizational risk-management processes utilized in determining cybersecurity investments. It describes how theoretical models and frameworks rely on either specific scenarios or controlled conditions and how decisions on cybersecurity spending within organizations-specifically, the funding available in comparison to the recommended security measures necessary for compliance-vary depending on stakeholders. As the trade-off between the costs of implementing a security measure and the benefit derived from the implementation of security controls is not easily measured, a business leader's decision to fund security measures may be biased. The author presents an innovative approach to assess cybersecurity initiatives with a risk-management perspective and leverages a data-centric focus on the evolution of cyber-attacks. This book is ideal for business school students and technology professionals with an interest in risk management.

The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback)
Te Wu
R1,660 Discovery Miles 16 600 Ships in 12 - 17 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

Cloud Data Center Network Architectures and Technologies (Hardcover): Lei Zhang, Le Chen Cloud Data Center Network Architectures and Technologies (Hardcover)
Lei Zhang, Le Chen; Contributions by Yang Chang Qing
R3,027 Discovery Miles 30 270 Ships in 10 - 15 working days

Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This book describes in detail the architecture design, technical implementation, planning and design, and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical evolution of DCNs, with the aim of helping readers understand the development of DCNs. It then proceeds to explain the design and implementation of cloud DCNs, including the service model of a single data center (DC), construction of physical and logical networks of DCs, construction of multiple DCNs, and security solutions of DCs. Next, this book dives deep into practices of cloud DCN deployment based on real-world cases to help readers better understand how to build cloud DCNs. Finally, this book introduces DCN openness and some of the hottest forward-looking technologies. In summary, you can use this book as a reference to help you to build secure, reliable, efficient, and open cloud DCNs. It is intended for technical professionals of enterprises, research institutes, information departments, and DCs, as well as teachers and students of computer network-related majors in colleges and universities. Authors Lei Zhang Mr. Zhang is the Chief Architect of Huawei's DCN solution. He has more than 20 years' experience in network product and solution design, as well as a wealth of expertise in product design and development, network planning and design, and network engineering project implementation. He has led the design and deployment of more than 10 large-scale DCNs for Fortune Global 500 companies worldwide. Le Chen Mr. Chen is a Huawei DCN Solution Documentation Engineer with eight years' experience in developing documents related to DCN products and solutions. He has participated in the design and delivery of multiple large-scale enterprise DCNs. Mr. Chen has written many popular technical document series, such as DCN Handbook and BGP Topic.

Intelligent and Connected Vehicle Security (Hardcover): Jiajia Liu, Abderrahim Benslimane Intelligent and Connected Vehicle Security (Hardcover)
Jiajia Liu, Abderrahim Benslimane
R2,876 Discovery Miles 28 760 Ships in 12 - 17 working days

Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasingly being applied in ICVs, making them more intelligent and connected with devices surrounding the vehicles. However, although the versatile connection and information exchange among ICVs, external devices and human beings provides vehicles with a better and faster perception of surrounding environments and a better driving experience for users, they also create a series of intrusion portals for malicious attackers which threaten the safety of drivers and passengers. This book is concerned with the recognition and protection against such threats. Security for ICVs includes information across the fields of automobile engineering, artificial intelligence, computer, microelectronics, automatic control, communication technology, big data, edge/cloud computing and others. This book comprehensively and systematically introduces security threats to ICVs coming from automotive technology development, on-board sensors, vehicle networking, automobile communications, intelligent transportation, big data, cloud computing, etc. Then, through discussion of some typical automobile cyber-attack cases studies, readers will gain a deeper understanding of the working principle of ICVs, so that they can test vehicles more objectively and scientifically. In this way they will find the existence of vulnerabilities and security risks and take the corresponding protective measures to prevent malicious attacks. Technical topics discussed in the book include but are not limited to: Electronic Control Unit and Vehicular Bus Security; Intra-vehicle Communication Security; V2X Communication Security; VANET Security; Unmanned Driving Security and Navigation Deception

Core Software Security - Security at the Source (Paperback): James Ransome, Anmol Misra Core Software Security - Security at the Source (Paperback)
James Ransome, Anmol Misra
R1,440 Discovery Miles 14 400 Ships in 12 - 17 working days

"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."-Dr. Dena Haritos Tsamitis. Carnegie Mellon University"... a must read for security specialists, software developers and software engineers. ... should be part of every security professional's library." -Dr. Larry Ponemon, Ponemon Institute"... the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. ...A must-have for anyone on the front lines of the Cyber War ..." -Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! "-Eric S. Yuan, Zoom Video CommunicationsThere is much publicity regarding network security, but the real cyber Achilles' heel is insecure software. Millions of software vulnerabilities create a cyber house of cards, in which we conduct our digital lives. In response, security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts, cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative, innovative people who write software. Core Software Security expounds developer-centric software security, a holistic process to engage creativity for security. As long as software is developed by humans, it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development, which lies at the heart of our cyber infrastructure. Whatever development method is employed, software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people, process, and technology Highlights the key success factors, deliverables, and metrics for each phase of the SDL Examines cost efficiencies, optimized performance, and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book's SDL framework View the authors' website at http://www.androidinsecurity.com/

(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd Edition (Paperback, 3rd Edition):... (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd Edition (Paperback, 3rd Edition)
M. Chapple
R778 Discovery Miles 7 780 Ships in 12 - 17 working days

Full-length practice tests covering all CISSP domains for the ultimate exam prep The (ISC)2 CISSP Official Practice Tests is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain. You also have access to four unique 125-question practice exams to help you master the material. As the only official practice tests endorsed by (ISC)2, this book gives you the advantage of full and complete preparation. These practice tests align with the 2021 version of the exam to ensure up-to-date preparation, and are designed to cover what you will see on exam day. Coverage includes: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security. The CISSP credential signifies a body of knowledge and a set of guaranteed skills that put you in demand in the marketplace. This book is your ticket to achieving this prestigious certification, by helping you test what you know against what you need to know. Test your knowledge of the 2021 exam domains Identify areas in need of further study Gauge your progress throughout your exam preparation Practice test taking with Sybex's online test environment containing the questions from the book The CISSP exam is refreshed every few years to ensure that candidates are up-to-date on the latest security topics and trends. Currently-aligned preparation resources are critical, and periodic practice tests are one of the best ways to truly measure your level of understanding.

Private Investigation and Homeland Security (Paperback): Daniel J Benny Private Investigation and Homeland Security (Paperback)
Daniel J Benny
R1,526 Discovery Miles 15 260 Ships in 12 - 17 working days

The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.

Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Paperback): Richard Warner, Robert Sloan Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Paperback)
Richard Warner, Robert Sloan
R627 Discovery Miles 6 270 Ships in 12 - 17 working days

The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Statistical Trend Analysis of Physically Unclonable Functions - An Approach via Text Mining (Hardcover): Behrouz Zolfaghari,... Statistical Trend Analysis of Physically Unclonable Functions - An Approach via Text Mining (Hardcover)
Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba, Hamid R. Nemati, Pinaki Mitra
R1,520 Discovery Miles 15 200 Ships in 12 - 17 working days

Physically Unclonable Functions (PUFs) translate unavoidable variations in certain parameters of materials, waves, or devices into random and unique signals. They have found many applications in the Internet of Things (IoT), authentication systems, FPGA industry, several other areas in communications and related technologies, and many commercial products. Statistical Trend Analysis of Physically Unclonable Functions first presents a review on cryptographic hardware and hardware-assisted cryptography. The review highlights PUF as a mega trend in research on cryptographic hardware design. Afterwards, the authors present a combined survey and research work on PUFs using a systematic approach. As part of the survey aspect, a state-of-the-art analysis is presented as well as a taxonomy on PUFs, a life cycle, and an established ecosystem for the technology. In another part of the survey, the evolutionary history of PUFs is examined, and strategies for further research in this area are suggested. In the research side, this book presents a novel approach for trend analysis that can be applied to any technology or research area. In this method, a text mining tool is used which extracts 1020 keywords from the titles of the sample papers. Then, a classifying tool classifies the keywords into 295 meaningful research topics. The popularity of each topic is then numerically measured and analyzed over the course of time through a statistical analysis on the number of research papers related to the topic as well as the number of their citations. The authors identify the most popular topics in four different domains; over the history of PUFs, during the recent years, in top conferences, and in top journals. The results are used to present an evolution study as well as a trend analysis and develop a roadmap for future research in this area. This method gives an automatic popularity-based statistical trend analysis which eliminates the need for passing personal judgments about the direction of trends, and provides concrete evidence to the future direction of research on PUFs. Another advantage of this method is the possibility of studying a whole lot of existing research works (more than 700 in this book). This book will appeal to researchers in text mining, cryptography, hardware security, and IoT.

Modern Cryptography with Proof Techniques and Implementations (Hardcover): Intae Kim, Wai Kong Lee, Seong Oun Hwang Modern Cryptography with Proof Techniques and Implementations (Hardcover)
Intae Kim, Wai Kong Lee, Seong Oun Hwang
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

Proof techniques in cryptography are very difficult to understand, even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proofs of the cryptographic schemes, practical aspects of them have received comparatively less attention. This book addresses these two issues by providing detailed, structured proofs and demonstrating examples, applications and implementations of the schemes, so that students and practitioners may obtain a practical view of the schemes. Seong Oun Hwang is a professor in the Department of Computer Engineering and director of Artificial Intelligence Security Research Center, Gachon University, Korea. He received the Ph.D. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), Korea. His research interests include cryptography, cybersecurity, networks, and machine learning. Intae Kim is an associate research fellow at the Institute of Cybersecurity and Cryptology, University of Wollongong, Australia. He received the Ph.D. degree in electronics and computer engineering from Hongik University, Korea. His research interests include cryptography, cybersecurity, and networks. Wai Kong Lee is an assistant professor in UTAR (University Tunku Abdul Rahman), Malaysia. He received the Ph.D. degree in engineering from UTAR, Malaysia. In between 2009 - 2012, he served as an R&D engineer in several multinational companies including Agilent Technologies (now known as Keysight) in Malaysia. His research interests include cryptography engineering, GPU computing, numerical algorithms, Internet of Things (IoT) and energy harvesting.

Cybersecurity Lessons from CoVID-19 (Hardcover): Robert Slade Cybersecurity Lessons from CoVID-19 (Hardcover)
Robert Slade
R1,511 Discovery Miles 15 110 Ships in 12 - 17 working days

Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It points out specific security fundamentals where social, medical, or business responses to the crisis failed or needed to make specific use of those concepts. For the most part, these lessons are simply reminders of factors that get neglected during times of non-crisis. The lessons particularly point out the importance of planning and resilience in systems and business. Those studying cybersecurity and its preventive measures and applications, as well as those involved in risk management studies and assessments, will all benefit greatly from the book. Robert Slade has had an extensive and prolific career in management, security, and telecommunications research, analysis, and consultancy. He has served as an educator visiting universities and delivering lecturers and seminars.

An Introduction to IoT Analytics (Hardcover): Harry G. Perros An Introduction to IoT Analytics (Hardcover)
Harry G. Perros
R3,498 Discovery Miles 34 980 Ships in 12 - 17 working days

This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.

An Introduction to IoT Analytics (Paperback): Harry G. Perros An Introduction to IoT Analytics (Paperback)
Harry G. Perros
R1,435 Discovery Miles 14 350 Ships in 12 - 17 working days

This book covers techniques that can be used to analyze data from IoT sensors and addresses questions regarding the performance of an IoT system. It strikes a balance between practice and theory so one can learn how to apply these tools in practice with a good understanding of their inner workings. This is an introductory book for readers who have no familiarity with these techniques. The techniques presented in An Introduction to IoT Analytics come from the areas of machine learning, statistics, and operations research. Machine learning techniques are described that can be used to analyze IoT data generated from sensors for clustering, classification, and regression. The statistical techniques described can be used to carry out regression and forecasting of IoT sensor data and dimensionality reduction of data sets. Operations research is concerned with the performance of an IoT system by constructing a model of the system under study and then carrying out a what-if analysis. The book also describes simulation techniques. Key Features IoT analytics is not just machine learning but also involves other tools, such as forecasting and simulation techniques. Many diagrams and examples are given throughout the book to fully explain the material presented. Each chapter concludes with a project designed to help readers better understand the techniques described. The material in this book has been class tested over several semesters. Practice exercises are included with solutions provided online at www.routledge.com/9780367686314 Harry G. Perros is a Professor of Computer Science at North Carolina State University, an Alumni Distinguished Graduate Professor, and an IEEE Fellow. He has published extensively in the area of performance modeling of computer and communication systems.

Official (ISC)2 (R) Guide to the CISSP (R)-ISSMP (R) CBK (R) (Hardcover, 2nd edition): Joseph Steinberg Official (ISC)2 (R) Guide to the CISSP (R)-ISSMP (R) CBK (R) (Hardcover, 2nd edition)
Joseph Steinberg
R2,150 Discovery Miles 21 500 Ships in 9 - 15 working days

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture. Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC)2(r) Guide to the ISSAP(r) CBK(r), Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations. Newly Enhanced Design This Guide Has It All Only guide endorsed by (ISC)2 Most up-to-date CISSP-ISSAP CBK Evolving terminology and changing requirements for security professionals Practical examples that illustrate how to apply concepts in real-life situations Chapter outlines and objectives Review questions and answers References to free study resources Read It. Study It. Refer to It Often. Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.

Digital Forensics and Investigations - People, Process, and Technologies to Defend the Enterprise (Paperback): Jason Sachowski Digital Forensics and Investigations - People, Process, and Technologies to Defend the Enterprise (Paperback)
Jason Sachowski
R2,136 Discovery Miles 21 360 Ships in 12 - 17 working days

Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques have remained consistent despite the evolution of technology, and, ultimately, it and can be applied to any form of digital data. However, within a corporate environment, digital forensic professionals are particularly challenged. They must maintain the legal admissibility and forensic viability of digital evidence in support of a broad range of different business functions that include incident response, electronic discovery (ediscovery), and ensuring the controls and accountability of such information across networks. Digital Forensics and Investigations: People, Process, and Technologies to Defend the Enterprise provides the methodologies and strategies necessary for these key business functions to seamlessly integrate digital forensic capabilities to guarantee the admissibility and integrity of digital evidence. In many books, the focus on digital evidence is primarily in the technical, software, and investigative elements, of which there are numerous publications. What tends to get overlooked are the people and process elements within the organization. Taking a step back, the book outlines the importance of integrating and accounting for the people, process, and technology components of digital forensics. In essence, to establish a holistic paradigm-and best-practice procedure and policy approach-to defending the enterprise. This book serves as a roadmap for professionals to successfully integrate an organization's people, process, and technology with other key business functions in an enterprise's digital forensic capabilities.

Software-Defined Networking and Security - From Theory to Practice (Paperback): Dijiang Huang, Ankur Chowdhary, Sandeep... Software-Defined Networking and Security - From Theory to Practice (Paperback)
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
R1,460 Discovery Miles 14 600 Ships in 12 - 17 working days

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security

AI and Deep Learning in Biometric Security - Trends, Potential, and Challenges (Hardcover): Gaurav Jaswal, Vivek Kanhangad,... AI and Deep Learning in Biometric Security - Trends, Potential, and Challenges (Hardcover)
Gaurav Jaswal, Vivek Kanhangad, Raghavendra Ramachandra
R4,510 Discovery Miles 45 100 Ships in 12 - 17 working days

This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. This text highlights a showcase of cutting-edge research on the use of convolution neural networks, autoencoders, recurrent convolutional neural networks in face, hand, iris, gait, fingerprint, vein, and medical biometric traits. It also provides a step-by-step guide to understanding deep learning concepts for biometrics authentication approaches and presents an analysis of biometric images under various environmental conditions. This book is sure to catch the attention of scholars, researchers, practitioners, and technology aspirants who are willing to research in the field of AI and biometric security.

Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback): Brij B. Gupta, Quan Z.... Machine Learning for Computer and Cyber Security - Principle, Algorithms, and Practices (Paperback)
Brij B. Gupta, Quan Z. Sheng
R1,570 Discovery Miles 15 700 Ships in 12 - 17 working days

While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.

Counter Terrorism Issues - Case Studies in the Courtroom (Paperback): James Ottavio Castagnera Counter Terrorism Issues - Case Studies in the Courtroom (Paperback)
James Ottavio Castagnera
R2,005 Discovery Miles 20 050 Ships in 12 - 17 working days

The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow. Exploring the most significant terrorist cases of the past two decades, Counter Terrorism Issues: Case Studies in the Courtroom presents a panoramic view of the American judiciary's handling of domestic terrorism in the last 20 years. Drawing extensively upon trial transcripts, witness statements, and judicial opinions, the book brings the underlying events back to life and demonstrates how the criminal justice system has sought to grapple with conflicting facts and countervailing legal rights and responsibilities. The book examines some of the most notorious recent cases-the two attacks on the World Trade Center, the Oklahoma City bombing, and the Fort Hood massacre. It also looks at lesser-known but equally important incidents, including those involving animal-rights radicals who harass university researchers and corporate executives, as well as the actions of terrorist "wannabes" who threaten our security. Also discussed are attempts by victims of terrorist attacks to sue state sponsors of terrorism. Through the words of witnesses, judges, and the attorneys who tried these cases in America's courtrooms, the book provides important commentary on the related back-stories and historical/political contexts of these events, enabling readers to understand the significance of these often-infamous attacks on U.S. soil.

Advanced Penetration Testing - Hacking the World's Most Secure Networks (Paperback): W Allsopp Advanced Penetration Testing - Hacking the World's Most Secure Networks (Paperback)
W Allsopp
R1,275 R867 Discovery Miles 8 670 Save R408 (32%) Ships in 12 - 17 working days

Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data even from organizations without a direct Internet connection this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level and this book shows you how to defend your high security network. * Use targeted social engineering pretexts to create the initial compromise * Leave a command and control structure in place for long-term access * Escalate privilege and breach networks, operating systems, and trust structures * Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

Security and Organization within IoT and Smart Cities (Hardcover): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Hardcover)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R2,080 Discovery Miles 20 800 Ships in 12 - 17 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Information Security and Optimization (Hardcover): Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta Information Security and Optimization (Hardcover)
Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
R3,183 Discovery Miles 31 830 Ships in 12 - 17 working days

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,394 Discovery Miles 13 940
Securing Remote Access in Palo Alto…
Tom Piens Paperback R1,273 Discovery Miles 12 730
Wireless Security Architecture…
J Minella Paperback R896 Discovery Miles 8 960
Internet of Things and Cyber Physical…
Keshav Kaushik, Susheela Dahiya, … Hardcover R1,840 Discovery Miles 18 400
Digital Blood on Their Hands - The…
Andrew Jenkinson Paperback R865 Discovery Miles 8 650
Privacy in Practice - Establish and…
Alan Tang Paperback R1,364 Discovery Miles 13 640
Data Localization Laws and Policy - The…
W. Kuan Hon Hardcover R4,337 Discovery Miles 43 370
8 Steps to Better Security - A Simple…
K Crawley Paperback R524 Discovery Miles 5 240
AWS Certified Security Study Guide…
Santana Paperback R1,115 Discovery Miles 11 150
The Pentester BluePrint - Starting a…
PL Wylie Paperback R555 Discovery Miles 5 550

 

Partners