![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > Network security
This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. The book's security and privacy analysis help with an understanding of the basics of blockchain, and it explores the quantifying impact of the new attack surfaces introduced by blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. It follows a practical approach to help understand how blockchain technology is used to transform cybersecurity solutions.
Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
This book presents a compilation of selected papers from the Fourth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in August 2019 in Guiyang, China. The purpose of the symposium was to discuss inspection, testing, certification and research concerning the software and hardware of instrument and control (I&C) systems used at nuclear power plants (NPP), such as sensors, actuators and control systems. The event provides a venue for exchange among experts, scholars and nuclear power practitioners, as well as a platform for the combination of teaching and research at universities and enterprises to promote the safe development of nuclear power plants. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.
Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
This book discusses the new roles that the VLSI (very-large-scale integration of semiconductor circuits) is taking for the safe, secure, and dependable design and operation of electronic systems. The book consists of three parts. Part I, as a general introduction to this vital topic, describes how electronic systems are designed and tested with particular emphasis on dependability engineering, where the simultaneous assessment of the detrimental outcome of failures and cost of their containment is made. This section also describes the related research project "Dependable VLSI Systems," in which the editor and authors of the book were involved for 8 years. Part II addresses various threats to the dependability of VLSIs as key systems components, including time-dependent degradations, variations in device characteristics, ionizing radiation, electromagnetic interference, design errors, and tampering, with discussion of technologies to counter those threats. Part III elaborates on the design and test technologies for dependability in such applications as control of robots and vehicles, data processing, and storage in a cloud environment and heterogeneous wireless telecommunications. This book is intended to be used as a reference for engineers who work on the design and testing of VLSI systems with particular attention to dependability. It can be used as a textbook in graduate courses as well. Readers interested in dependable systems from social and industrial-economic perspectives will also benefit from the discussions in this book.
This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.
This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.
Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.
Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest empirical research and theoretical frameworks in the area of information security. This reference book presents research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems. This book will be useful for academics, students, professionals, executives, and researchers who want to improve their understanding of the role of information security at different levels of the knowledge society.
E-governance is an application of IT; holding uses for the delivery of Government services, information exchange between Government to public, e-business, and various. However, the aim of cybersecurity is to provide security from cyber-attacks from the view of emerging technology is used by hackers. Hence, it is important to provide fast protection application software and structure. In this scenario, the government may be focused to provide capable Internet carefully without the risk of fraud. These days the study deliberates about the issue of the world while technology is helping and fruitful on each step of life like e-Governance applications. Though, has been limited study has been done by a previous study on protocols of cybersecurity for e-Governance.
This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.
Earth at Risk in the 21st Century offers critical interdisciplinary reflections on peace, security, gender relations, migration and the environment, all of which are threatened by climate change, with women and children affected most. Deep-rooted gender discrimination is also a result of the destructive exploitation of natural resources and the pollution of soils, water, biota and air. In the Anthropocene, the management of human society and global resources has become unsustainable and has created multiple conflicts by increasing survival threats primarily for poor people in the Global South. Alternative approaches to peace and security, focusing from bottom-up on an engendered peace with sustainability, may help society and the environment to be managed in the highly fragile natural conditions of a 'hothouse Earth'. Thus, the book explores systemic alternatives based on indigenous wisdom, gift economy and the economy of solidarity, in which an alternative cosmovision fosters mutual care between humankind and nature. * Special analysis of risks to the survival of humankind in the 21st century. * Interdisciplinary studies on peace, security, gender and environment related to global environmental and climate change. * Critical reflections on gender relations, peace, security, migration and the environment * Systematic analysis of food, water, health, energy security and its nexus. * Alternative proposals from the Global South with indigenous wisdom for saving Mother Earth.
Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.
Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most extensively implemented protocol is quantum key distribution (QKD), which enables secure communication between two users. The aim of this book is to introduce the reader to state-of-the-art QKD and illustrate its recent multi-user generalization: quantum conference key agreement. With its pedagogical approach that doesn't disdain going into details, the book enables the reader to join in cutting-edge research on quantum cryptography.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
Countries are increasingly introducing data localization laws and data export restrictions, threatening digital globalization and inhibiting cloud computing's adoption despite its acknowledged benefits. Through a cloud computing lens, this multi-disciplinary book examines the personal data transfers restriction under the EU Data Protection Directive (including the EUUS Privacy Shield and General Data Protection Regulation). It covers historical objectives and practical problems, showing why the focus should move from physical data location to effective jurisdiction over those controlling access to intelligible data and control of access to data through security measures. The book further discusses data localization laws' failure to solve concerns regarding the topical and contentious issue of mass state surveillance. Its arguments are also relevant to other data localization laws, cross-border transfers of non personal data and transfers not involving cloud computing. Comprehensive yet accessible, this book is of great value to academics in law, policy, computer science and technology. It is also highly relevant to cloud computing/technology organisations and other businesses in the EU and beyond, data privacy professionals, policymakers and regulators.
This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field's evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. After an overview of the field, female security professionals share their own stories of technology and innovation in security today; the foundation, where research is headed, and the emerging trends. Women currently make up a very small pocket of cyber security staffing - this book aims to increase the visibility of women in the field and their contributions and encourage other females to join the field. The contributors hold various roles from executive leadership, to engineers, analysts, and researchers.
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.
This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.
This book analyzes the fundamental issues faced when blockchain technology is applied to real-life applications. These concerns, not only in the realm of computer science, are caused by the nature of technological design. Blockchain is considered the foundation of a wide range of flexible ecosystems; its technology is an excellent mixture of mathematics, cryptography, incentive mechanisms, economics, and pertinent regulations. The book provides an essential understanding of why such fundamental issues arise, by revising the underlying theories. Blockchain theory is thus presented in an easy-to-understand, useful manner. Also explained is the reason why blockchain is hard to adopt for real-life problems but is valuable as a foundation for flexible ecosystems. Included are directions for solving those problems and finding suitable areas for blockchain applications in the future. The authors of this work are experts from a wide range of backgrounds such as cryptography, distributed computing, computer science, trust, identity, regulation, and standardization. Their contributions collected here will appeal to all who are interested in blockchain and the elements surrounding it. |
![]() ![]() You may like...
Stabilization and H Control of Switched…
Jun Fu, Ruicheng Ma
Hardcover
R2,873
Discovery Miles 28 730
Adaptive Logics for Defeasible Reasoning…
Christian Strasser
Hardcover
Numbers, Hypotheses & Conclusions - A…
Colin Tredoux, Kevin Durrheim
Paperback
Applied General Equilibrium - An…
Manuel Alejandro Cardenete, Ana-Isabel Guerra, …
Hardcover
R2,975
Discovery Miles 29 750
|