0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (222)
  • R250 - R500 (558)
  • R500+ (5,322)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback): Stephen D Gantz The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback)
Stephen D Gantz
R901 Discovery Miles 9 010 Ships in 12 - 19 working days

"The Basics of IT Audit: Purposes, Processes, and Practical Information" provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.

IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements.

This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
Provides a concise treatment of IT auditing, allowing you to prepare for, participate in, and respond to the resultsDiscusses the pros and cons of doing internal and external IT audits, including the benefits and potential drawbacks of eachCovers the basics of complex regulations and standards, such as Sarbanes-Oxley, SEC (public companies), HIPAA, and FFIECIncludes most methods and frameworks, including GAAS, COSO, COBIT, ITIL, ISO (27000), and FISCAM

FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed): Laura P Taylor FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed)
Laura P Taylor
R1,579 Discovery Miles 15 790 Ships in 12 - 19 working days

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.

Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. "

FISMA Compliance Handbook Second Edition, "also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
Includes new information on cloud computing compliance from Laura Taylor, the federal government s technical lead for FedRAMP

Includes coverage for both corporate and government IT managers

Learn how to prepare for, perform, and document FISMA compliance projects

This book is used by various colleges and universities in information security and MBA curriculums. "

Internet and Intranet Security (Hardcover, 2nd Revised edition): Rolf Oppliger Internet and Intranet Security (Hardcover, 2nd Revised edition)
Rolf Oppliger
R2,996 Discovery Miles 29 960 Ships in 10 - 15 working days

This extensively revised, new edition of the 1998 Artech House classic, "Internet and Intranet Security", offers professionals an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall technologies to help practitioners provide access control service, and discusses the cryptographic protocols used to provide today's communication security services. From TCP/IP networking and cryptographic fundamentals, to firewall technologies, communication security protocols, and public key infrastructures, this handy reference offers practical guidance in utilizing cutting-edge technologies to secure various applications in the field of e-commerce and e-business. The book explores the rationale behind the security technologies that have been proposed and deployed on the Internet, and shows how to implement security mechanisms and corresponding protocol specifications.

Information Protection Playbook (Paperback): Greg Kane, Lorna Koppel Information Protection Playbook (Paperback)
Greg Kane, Lorna Koppel
R1,544 Discovery Miles 15 440 Ships in 12 - 19 working days

The primary" "goal of the" Information Protection Playbook" is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy.

Using the guidelines provided in the "Information Protection Playbook," security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.

The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.

The "Information Protection Playbook" is a part of Elsevier s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standardsDraws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive CouncilIncludes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book"

Professional Penetration Testing - Creating and Learning in a Hacking Lab (Paperback, 2nd edition): Thomas Wilhelm Professional Penetration Testing - Creating and Learning in a Hacking Lab (Paperback, 2nd edition)
Thomas Wilhelm
R1,782 Discovery Miles 17 820 Ships in 12 - 19 working days

"Professional Penetration Testing "walks you through the entire process of setting up and running a pen test lab. Penetration testing-the act of testing a computer network to find security vulnerabilities before they are maliciously exploited-is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.

Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.

All disc-based content for this title is now available on the Web.

Find out how to turn hacking and pen testing skills into a professional career

Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers

Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business

Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018): Tsuyoshi Takagi,... Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R4,433 Discovery Miles 44 330 Ships in 10 - 15 working days

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.

Surviving Cyberwar (Hardcover): Richard Stiennon Surviving Cyberwar (Hardcover)
Richard Stiennon
R2,365 Discovery Miles 23 650 Ships in 12 - 19 working days

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: *begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; *follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; *moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; *provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and *finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.

Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016): Yulong Zou, Jia Zhu Physical-Layer Security for Cooperative Relay Networks (Hardcover, 1st ed. 2016)
Yulong Zou, Jia Zhu
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.

Reforming European Data Protection Law (Hardcover, 2015 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert Reforming European Data Protection Law (Hardcover, 2015 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert
R4,677 R3,820 Discovery Miles 38 200 Save R857 (18%) Ships in 12 - 19 working days

This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Security of Cyber-Physical Systems - Vulnerability and Impact (Hardcover, 1st ed. 2020): Hadis Karimipour, Pirathayini... Security of Cyber-Physical Systems - Vulnerability and Impact (Hardcover, 1st ed. 2020)
Hadis Karimipour, Pirathayini Srikantha, Hany Farag, Jin Wei-Kocsis
R5,128 Discovery Miles 51 280 Ships in 10 - 15 working days

This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today's technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.

Security and the Networked Society (Hardcover, 2013 ed.): Mark A. Gregory, David Glance Security and the Networked Society (Hardcover, 2013 ed.)
Mark A. Gregory, David Glance
R2,908 R2,088 Discovery Miles 20 880 Save R820 (28%) Ships in 12 - 19 working days

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource.

Outlier Analysis (Hardcover, 2013 ed.): Charu C. Aggarwal Outlier Analysis (Hardcover, 2013 ed.)
Charu C. Aggarwal
R4,488 Discovery Miles 44 880 Ships in 12 - 19 working days

With the increasing advances in hardware technology for data collection, and advances in software technology (databases) for data organization, computer scientists have increasingly participated in the latest advancements of the outlier analysis field. Computer scientists, specifically, approach this field based on their practical experiences in managing large amounts of data, and with far fewer assumptions- the data can be of any type, structured or unstructured, and may be extremely large. Outlier Analysis is a comprehensive exposition, as understood by data mining experts, statisticians and computer scientists. The book has been organized carefully, and emphasis was placed on simplifying the content, so that students and practitioners can also benefit. Chapters will typically cover one of three areas: methods and techniques commonly used in outlier analysis, such as linear methods, proximity-based methods, subspace methods, and supervised methods; data domains, such as, text, categorical, mixed-attribute, time-series, streaming, discrete sequence, spatial and network data; and key applications of these methods as applied to diverse domains such as credit card fraud detection, intrusion detection, medical diagnosis, earth science, web log analytics, and social network analysis are covered.

Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New): Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New)
R4,979 Discovery Miles 49 790 Ships in 10 - 15 working days

Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.

IC-BCT 2019 - Proceedings of the International Conference on Blockchain Technology (Hardcover, 1st ed. 2020): Dhiren, Patel,... IC-BCT 2019 - Proceedings of the International Conference on Blockchain Technology (Hardcover, 1st ed. 2020)
Dhiren, Patel, Sukumar Nandi, B.K Mishra, Deven Shah, Chirag N. Modi, …
R2,897 Discovery Miles 28 970 Ships in 10 - 15 working days

This book presents articles from the International Conference on Blockchain Technology (IC-BCT) 2019, held in Mumbai, India, and highlights recent advances in the field. It brings together researchers and industry practitioners to show case their ideas linked to business case studies, and provides an opportunity for engineers, researchers, startups and professionals in the field of Blockchain technology to further collaboration.

Information Science and Applications 2018 - ICISA 2018 (Hardcover, 1st ed. 2019): Kuinam J. Kim, Nakhoon Baek Information Science and Applications 2018 - ICISA 2018 (Hardcover, 1st ed. 2019)
Kuinam J. Kim, Nakhoon Baek
R7,694 Discovery Miles 76 940 Ships in 10 - 15 working days

This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.

Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016): Ehab Al-Shaer,... Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016)
Ehab Al-Shaer, Mohammad Ashiqur Rahman
R3,453 Discovery Miles 34 530 Ships in 12 - 19 working days

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Hardcover): Sunita Vikrant Dhavale Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Hardcover)
Sunita Vikrant Dhavale
R5,913 Discovery Miles 59 130 Ships in 10 - 15 working days

In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.

The Smartest Person in the Room - The Root Cause and New Solution for Cybersecurity (Hardcover): Christian Espinosa The Smartest Person in the Room - The Root Cause and New Solution for Cybersecurity (Hardcover)
Christian Espinosa
R705 Discovery Miles 7 050 Ships in 12 - 19 working days
Partially Homomorphic Encryption (Hardcover, 1st ed. 2021): Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger Partially Homomorphic Encryption (Hardcover, 1st ed. 2021)
Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger
R3,602 Discovery Miles 36 020 Ships in 10 - 15 working days

This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik; Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years partially and fully homomorphic encryption algorithms have been proposed and researchers have addressed issues related to their formulation, arithmetic, efficiency and security. Formidable efficiency barriers remain, but we now have a variety of algorithms that can be applied to various private computation problems in healthcare, finance and national security, and studying these functions may help us to understand the difficulties ahead. The book is valuable for researchers and graduate students in Computer Science, Engineering, and Mathematics who are engaged with Cryptology.

Security, Privacy and Trust in Cloud Systems (Hardcover, 2014 ed.): Surya Nepal, Mukaddim Pathan Security, Privacy and Trust in Cloud Systems (Hardcover, 2014 ed.)
Surya Nepal, Mukaddim Pathan
R4,682 R3,820 Discovery Miles 38 200 Save R862 (18%) Ships in 12 - 19 working days

The book compiles technologies for enhancing and provisioning security, privacy and trust in cloud systems based on Quality of Service requirements. It is a timely contribution to a field that is gaining considerable research interest, momentum, and provides a comprehensive coverage of technologies related to cloud security, privacy and trust. In particular, the book includes
- Cloud security fundamentals and related technologies to-date, with a comprehensive
coverage of evolution, current landscape, and future roadmap.
- A smooth organization with introductory, advanced and specialist content, i.e. from basics
of security, privacy and trust in cloud systems, to advanced cartographic techniques,
case studies covering both social and technological aspects, and advanced platforms.
- Case studies written by professionals and/or industrial researchers.
- Inclusion of a section on Cloud security and eGovernance tutorial that can be used
for knowledge transfer and teaching purpose.
- Identification of open research issues to help practitioners and researchers.
The book is a timely topic for readers, including practicing engineers and
academics, in the domains related to the engineering, science, and art of building networks and
networked applications. Specifically, upon reading this book, audiences will perceive the following
benefits:
1. Learn the state-of-the-art in research and development on cloud security, privacy and
trust.
2. Obtain a future roadmap by learning open research issues.
3. Gather the background knowledge to tackle key problems, whose solutions will enhance the evolution of next-generation secure cloud systems.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - International Symposium on Software... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (Hardcover, 1st ed. 2017)
Yang Xu
R5,939 Discovery Miles 59 390 Ships in 10 - 15 working days

These proceedings present the latest information on software reliability, industrial safety, cyber security, physical protection, testing and verification for nuclear power plants. The papers were selected from more than 80 submissions and presented at the First International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection for Nuclear Power Plants, held in Yinchuan, China on May 30 - June 1, 2016. The primary aim of this symposium was to provide a platform to facilitate the discussion for comprehension, application and management of digital instrumentation, control systems and technologies in nuclear power plants. The book reflects not only the state of the art and latest trends in nuclear instrumentation and control system technologies, but also China's increasing influence in this area. It is a valuable resource for both practitioners and academics working in the field of nuclear instrumentation, control systems and other safety-critical systems, as well as nuclear power plant managers, public officials and regulatory authorities.

Code Breaking in the Pacific (Hardcover, 2014 ed.): Peter Donovan, John Mack Code Breaking in the Pacific (Hardcover, 2014 ed.)
Peter Donovan, John Mack
R4,259 Discovery Miles 42 590 Ships in 12 - 19 working days

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource."

Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition): Edward Amoroso Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition)
Edward Amoroso
R1,549 Discovery Miles 15 490 Ships in 12 - 19 working days

This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows students to understand how any organization, such as a government agency, integrates the principles into their local environment. The STUDENT EDITION features several case studies illustrating actual implementation scenarios of the principals and requirements discussed in the text. It also includes helpful pedagogical elements such as chapter outlines, chapter summaries, learning checklists, and a 2-color interior. And it boasts a new and complete instructor ancillary package including test bank, IM, Ppt slides, case study questions, and more.

Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges

Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues

Includes instructor slides for each chapter as well as an instructor s manual with sample syllabi and test bank"

Handbook on Securing Cyber-Physical Critical Infrastructure (Hardcover, New): Sajal K. Das, Krishna Kant, Nan Zhang Handbook on Securing Cyber-Physical Critical Infrastructure (Hardcover, New)
Sajal K. Das, Krishna Kant, Nan Zhang
R2,033 Discovery Miles 20 330 Ships in 12 - 19 working days

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios

*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.

*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Security in Wireless LANs and MANs (Hardcover): Thomas Hardjono, Lakshminath R. Dondeti Security in Wireless LANs and MANs (Hardcover)
Thomas Hardjono, Lakshminath R. Dondeti
R2,719 Discovery Miles 27 190 Ships in 10 - 15 working days

With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues. Including detailed descriptions of possible solutions to a number of specific security problems, the book gives practitioners the hands-on techniques that they need to secure wireless networks in the enterprise and the home.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Hacker, I Am
Craig Ford Hardcover R969 R830 Discovery Miles 8 300
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R6,432 Discovery Miles 64 320
The Cybersecurity Mindset - A Virtual…
Dewayne Hart Hardcover R784 Discovery Miles 7 840
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
Linux for Hackers - A Comprehensive…
William Vance Hardcover R625 R568 Discovery Miles 5 680
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
PCI Dss: A Pocket Guide
IT Governance Paperback R417 Discovery Miles 4 170
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,654 Discovery Miles 86 540
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,724 Discovery Miles 67 240
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,184 Discovery Miles 11 840

 

Partners