0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (250)
  • R250 - R500 (595)
  • R500+ (5,549)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Paperback): Richard Warner, Robert Sloan Why Don't We Defend Better? - Data Breaches, Risk Management, and Public Policy (Paperback)
Richard Warner, Robert Sloan
R639 Discovery Miles 6 390 Ships in 12 - 17 working days

The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed

Security and Organization within IoT and Smart Cities (Hardcover): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Hardcover)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R2,120 Discovery Miles 21 200 Ships in 12 - 17 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Information Security and Optimization (Hardcover): Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta Information Security and Optimization (Hardcover)
Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
R3,246 Discovery Miles 32 460 Ships in 12 - 17 working days

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

Enhancing Business Continuity and IT Capability - System Administration and Server Operating Platforms (Hardcover): Nijaz... Enhancing Business Continuity and IT Capability - System Administration and Server Operating Platforms (Hardcover)
Nijaz Bajgoric, Lejla Turulja, Semir Ibrahimovic, Amra Alagic
R2,797 Discovery Miles 27 970 Ships in 12 - 17 working days

Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company's information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm's performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book.

Security in the Private Cloud (Paperback): John R Vacca Security in the Private Cloud (Paperback)
John R Vacca
R1,466 Discovery Miles 14 660 Ships in 12 - 17 working days

This comprehensive handbook serves as a professional reference and practitioner's guide to today's most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy.

Practical Cloud Security - A Cross-Industry View (Paperback): Kevin L. Jackson, Melvin B. Greer Jr. Practical Cloud Security - A Cross-Industry View (Paperback)
Kevin L. Jackson, Melvin B. Greer Jr.
R1,436 Discovery Miles 14 360 Ships in 12 - 17 working days

Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes, not the least of which is documenting the breadth and severity of the challenges that today's enterprises face, and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies, but manage their potential risks. Key Features * Provides a cross-industry view of contemporary cloud computing security challenges, solutions, and lessons learned * Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies * Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements

Forensic Document Examination in the 21st Century (Hardcover): Miriam Angel, Jan Seaman Kelly Forensic Document Examination in the 21st Century (Hardcover)
Miriam Angel, Jan Seaman Kelly
R3,269 Discovery Miles 32 690 Ships in 12 - 17 working days

Forensic Document Examination in the 21st Century covers the latest technology and techniques providing a complete resource on contemporary issues and methods in forensic document examination. Forensic document examiners provide their findings as expert testimony in court. Due to rapid changes in technology, including digital documents, printing and photocopying capabilities, and more, there is a great need for this up-to-date reference. The examination of documents can include comparison of handwriting or hand-printing; detection of alterations or photocopier and computer manipulation; restoration or decipherment of erased and obliterated writing; visualization of latent impressions; the identification of printing processes; and differentiation of inks. Computer-generated documents are prevalent, and electronically-captured signatures are becoming more widespread, meaning the knowledge of advances in technology and adoption of new validated techniques and methods of document examination are crucial to the reliability of forensic opinions. Forensic Document Examination in the 21st Century includes the latest research on the subject and with contributions from leading experts on their various areas of expertise. The book will be a welcome addition to the literature and support the foundational basis for methods and procedures for use it expert testimony in court, serving as a resource for forensic document examiners, trainees, and those in the criminal and legal communities who use the services of expert document examiners and witnesses

Monitoring Laws - Profiling and Identity in the World State (Paperback, New Ed): Jake Goldenfein Monitoring Laws - Profiling and Identity in the World State (Paperback, New Ed)
Jake Goldenfein
R714 Discovery Miles 7 140 Ships in 12 - 17 working days

Our world and the people within it are increasingly interpreted and classified by automated systems. At the same time, automated classifications influence what happens in the physical world. These entanglements change what it means to interact with governance, and shift what elements of our identity are knowable and meaningful. In this cyber-physical world, or 'world state', what is the role for law? Specifically, how should law address the claim that computational systems know us better than we know ourselves? Monitoring Laws traces the history of government profiling from the invention of photography through to emerging applications of computer vision for personality and behavioral analysis. It asks what dimensions of profiling have provoked legal intervention in the past, and what is different about contemporary profiling that requires updating our legal tools. This work should be read by anyone interested in how computation is changing society and governance, and what it is about people that law should protect in a computational world.

Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R2,442 Discovery Miles 24 420 Ships in 12 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems - The SHIELD Methodology (Paperback):... Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems - The SHIELD Methodology (Paperback)
Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria
R1,879 Discovery Miles 18 790 Ships in 12 - 17 working days

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIELD philosophy, that relies on an overlay approach to SPD, on a methodology for composable SPD, on the use of semantics, and on the design of embedded systems with built-in SPD. The book explores new ground and illustrates the development of approximately forty prototypes capable of managing and enhancing SPD, including secure boot, trusted execution environments, adaptable radio interfaces, and different implementations of the middleware for measuring and composing SPD.

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R4,816 Discovery Miles 48 160 Ships in 9 - 15 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition): Daniel Carter CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition)
Daniel Carter
R991 Discovery Miles 9 910 Ships in 12 - 17 working days

This fully updated self-study guide delivers 100% coverage of all topics on the current version of the CCSP exam Thoroughly revised for the 2022 edition of the exam, this highly effective test preparation guide covers all six domains within the CCSP Body of Knowledge. The book offers clear explanations of every subject on the CCSP exam and features accurate practice questions and real-world examples. New, updated, or expanded coverage includes cloud data security, DevOps security, mobile computing, threat modeling paradigms, regulatory and legal frameworks, and best practices and standards. Written by a respected computer security expert, CCSP Certified Cloud Security Professional All-in-One Exam Guide, Third Edition is both a powerful study tool and a valuable reference that will serve professionals long after the test. To aid in self-study, each chapter includes exam tips that highlight key information, a summary that serves as a quick review of salient points, and practice questions that allow you to test your comprehension. Special design elements throughout provide insight and call out potentially harmful situations. All practice questions match the tone, content, and format of those on the actual exam Includes access to 300 practice questions in the TotalTester (TM) Online customizable test engine Written by an IT security expert and experienced author

The Evolution of Business in the Cyber Age - Digital Transformation, Threats, and Security (Hardcover): Rahul Verma, Manisha... The Evolution of Business in the Cyber Age - Digital Transformation, Threats, and Security (Hardcover)
Rahul Verma, Manisha Mathur, Divya Gupta Chowdhry
R3,755 Discovery Miles 37 550 Ships in 9 - 15 working days

This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and maintaining effective cyber protection. The book begins with a section on Digital Business Transformation, which includes chapters on tools for integrated marketing communications, human resource workplace digitalization, the integration of the Internet of Things in the workplace, Big Data, and more. The technologies discussed aim to help businesses and entrepreneurs transform themselves to align with today's modern digital climate. The Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security provides a wealth of information for those involved in the development and management of conducting business online as well as for those responsible for cyber protection and security. Faculty and students, researchers, and industry professionals will find much of value in this volume.

Testing and Securing Web Applications (Paperback): Ravi Das, Greg Johnson Testing and Securing Web Applications (Paperback)
Ravi Das, Greg Johnson
R1,678 Discovery Miles 16 780 Ships in 12 - 17 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Testing and Securing Web Applications (Hardcover): Ravi Das, Greg Johnson Testing and Securing Web Applications (Hardcover)
Ravi Das, Greg Johnson
R3,994 Discovery Miles 39 940 Ships in 12 - 17 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Systems Approach to the Design of Commercial Aircraft (Hardcover): Scott Jackson, Ricardo Moraes dos Santos Systems Approach to the Design of Commercial Aircraft (Hardcover)
Scott Jackson, Ricardo Moraes dos Santos
R2,489 Discovery Miles 24 890 Ships in 12 - 17 working days

While aviation fatalities have thankfully fallen dramatically in recent years, the phenomena of complexity and cognitive bias have been shown to be factors in many accidents. An understanding of these phenomena promises to bring the fatality rate even lower, and a deeper understanding of commercial aircraft in the context of systems engineering will contribute to that trend. Systems Approach to the Design of Commercial Aircraft describes commercial aircraft from an advanced systems point of view, addressing complexity, cybersecurity, and systems architecting. In addition, it provides an explanation of systems engineering, describes how systems engineering forms a framework for commercial aircraft, covers how systems engineering and systems architecting relate to commercial aircraft, addresses complexity, and shows how humans fit into systems engineering and the importance for commercial aircraft. It goes onto present how cybersecurity plays an important role in the mix and how human interface fits in. The readership includes designers of aircraft, manufacturers, researchers, systems engineers, and students. Scott Jackson is a fellow of the International Council on Systems Engineering (INCOSE) and the author of Systems Engineering for Commercial Aircraft (1997 and 2015) in English and Chinese. Ricardo Moraes dos Santos is a senior systems engineer at EMBRAER S/A and an INCOSE Brazil chapter director. He works with Architecting process (Corporate) and is head of Cybersecurity and Safety (STPA Applications) at EMBRAER S/A.

AI-Centric Smart City Ecosystems - Technologies, Design and Implementation (Hardcover): Alex Khang, Sita Rani, Arun Kumar... AI-Centric Smart City Ecosystems - Technologies, Design and Implementation (Hardcover)
Alex Khang, Sita Rani, Arun Kumar Sivaraman
R3,557 Discovery Miles 35 570 Ships in 12 - 17 working days

Explains smart city ecosystem and AI-centric solutions Presents the application of design principles and computer vision models for operating smart cities and security systems Discusses how to integrate the AI-based controls systems to make the IoT devices smarter Explains data engineering and visualization patterns for monitoring smart city systems Discusses self-driving car models and transportation infrastructures

Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover): Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover)
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong
R5,330 Discovery Miles 53 300 Ships in 12 - 17 working days

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

Cybersecurity for Information Professionals - Concepts and Applications (Hardcover): Hsia-Ching Chang, Suliman Hawamdeh Cybersecurity for Information Professionals - Concepts and Applications (Hardcover)
Hsia-Ching Chang, Suliman Hawamdeh
R2,186 Discovery Miles 21 860 Ships in 12 - 17 working days

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.

Data Analytics - Concepts, Techniques, and Applications (Paperback): Mohiuddin Ahmed, Al-Sakib Khan Pathan Data Analytics - Concepts, Techniques, and Applications (Paperback)
Mohiuddin Ahmed, Al-Sakib Khan Pathan
R1,592 Discovery Miles 15 920 Ships in 12 - 17 working days

Large data sets arriving at every increasing speeds require a new set of efficient data analysis techniques. Data analytics are becoming an essential component for every organization and technologies such as health care, financial trading, Internet of Things, Smart Cities or Cyber Physical Systems. However, these diverse application domains give rise to new research challenges. In this context, the book provides a broad picture on the concepts, techniques, applications, and open research directions in this area. In addition, it serves as a single source of reference for acquiring the knowledge on emerging Big Data Analytics technologies.

Security and Data Reliability in Cooperative Wireless Networks (Paperback): Emad  Hassan Security and Data Reliability in Cooperative Wireless Networks (Paperback)
Emad Hassan
R1,484 Discovery Miles 14 840 Ships in 12 - 17 working days

Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybrid Self-Healing scheme to enhance the confidentiality of the data collected by UWSN. It ends with a proposal called Self-Healing Cluster Controlled Mobility (SH-CCM) scheme based on hybrid cooperation between both Proactive and Reactive peers and the sick sensors at both network and cluster levels to guarantee the security in UWSN.

The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications - The Intelligent Cyber Shield for Smart Cities... The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications - The Intelligent Cyber Shield for Smart Cities (Paperback)
Rocky Termanini
R1,481 Discovery Miles 14 810 Ships in 12 - 17 working days

Present anti-virus technologies do not have the symmetrical weaponry to defeat massive DDoS attacks on smart cities. Smart cities require a new set of holistic and AI-centric cognitive technology, such as autonomic components that replicate the human immune system, and a smart grid that connects all IoT devices. The book introduces Digital Immunity and covers the human immune system, massive distributed attacks (DDoS) and the future generations cyber attacks, the anatomy and critical success factors of smart city, Digital Immunity and the role of the Smart Grid, how Digital Immunity defends the smart city and annihilates massive malware, and Digital Immunity to combat global cyber terrorism.

Empirical Research for Software Security - Foundations and Experience (Paperback): Lotfi Ben Othmane, Martin Gilje Jaatun,... Empirical Research for Software Security - Foundations and Experience (Paperback)
Lotfi Ben Othmane, Martin Gilje Jaatun, Edgar Weippl
R1,454 Discovery Miles 14 540 Ships in 12 - 17 working days

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Location Privacy in Wireless Sensor Networks (Paperback): Ruben Rios, Javier Lopez, Jorge Cuellar Location Privacy in Wireless Sensor Networks (Paperback)
Ruben Rios, Javier Lopez, Jorge Cuellar
R1,435 Discovery Miles 14 350 Ships in 12 - 17 working days

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.

Security and Privacy in Internet of Things (IoTs) - Models, Algorithms, and Implementations (Paperback): Fei Hu Security and Privacy in Internet of Things (IoTs) - Models, Algorithms, and Implementations (Paperback)
Fei Hu
R1,495 Discovery Miles 14 950 Ships in 12 - 17 working days

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity For Dummies, 2nd Edition
J. Steinberg Paperback R795 R572 Discovery Miles 5 720
(ISC)2 CCSP Certified Cloud Security…
M. Chapple Paperback R1,126 Discovery Miles 11 260
AI-based Metaheuristics for Information…
Apoorva S Shastri, Mangal Singh, … Hardcover R2,371 Discovery Miles 23 710
Hacking For Dummies, 7th Edition
K Beaver Paperback R555 Discovery Miles 5 550
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,124 R907 Discovery Miles 9 070
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360
The Pentester BluePrint - Starting a…
PL Wylie Paperback R566 Discovery Miles 5 660
Principles of Information Security
Herbert Mattord, Michael Whitman Paperback R1,300 R1,167 Discovery Miles 11 670
Responsible Graph Neural Networks
Nour Moustafa, Mohamed Abdel-Basset, … Paperback R1,362 Discovery Miles 13 620
CISSP Passport
Bobby Rogers Paperback R622 Discovery Miles 6 220

 

Partners