0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (262)
  • R250 - R500 (602)
  • R500+ (5,514)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover): Frank Siepmann Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover)
Frank Siepmann
R1,867 Discovery Miles 18 670 Ships in 12 - 17 working days

With cloud computing quickly becoming a standard in today s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments requiring a change in how we evaluate risk and protect information, processes, and people.
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization.
Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization.
Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics.
By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.

Handbook of Image-Based Security Techniques (Paperback): Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri Handbook of Image-Based Security Techniques (Paperback)
Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
R1,560 Discovery Miles 15 600 Ships in 12 - 17 working days

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required. Features: Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book Includes real-life examples and applications throughout Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques Presents the implementation of all important concepts in MATLAB

Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback): Sinjini Mitra, Mikhail Gofman Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback)
Sinjini Mitra, Mikhail Gofman
R1,446 Discovery Miles 14 460 Ships in 12 - 17 working days

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,368 Discovery Miles 13 680 Ships in 12 - 17 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

Practical Data Security - Applied Information Technology (Paperback): John Gordon Practical Data Security - Applied Information Technology (Paperback)
John Gordon
R1,025 Discovery Miles 10 250 Ships in 12 - 17 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback): Todd Fitzgerald Information Security Governance Simplified - From the Boardroom to the Keyboard (Paperback)
Todd Fitzgerald
R1,428 Discovery Miles 14 280 Ships in 12 - 17 working days

Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.

Information Security Management Handbook, Volume 7 (Hardcover, 6th edition): Richard O'Hanley, James S. Tiller Information Security Management Handbook, Volume 7 (Hardcover, 6th edition)
Richard O'Hanley, James S. Tiller
R4,240 Discovery Miles 42 400 Ships in 12 - 17 working days

Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals Updates its bestselling predecessors with new developments in information security and the (ISC)2 (R) CISSP (R) CBK (R) Provides valuable insights from leaders in the field on the theory and practice of computer security technology Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

A Singing Contest - Conventions of Sound in the Poetry of Seamus Heaney (Paperback): Meg Tyler A Singing Contest - Conventions of Sound in the Poetry of Seamus Heaney (Paperback)
Meg Tyler
R1,467 Discovery Miles 14 670 Ships in 12 - 17 working days

First published in 2005. Routledge is an imprint of Taylor & Francis, an informa company.

Cyber-Physical Systems - Integrated Computing and Engineering Design (Hardcover, New): Fei Hu Cyber-Physical Systems - Integrated Computing and Engineering Design (Hardcover, New)
Fei Hu
R3,942 Discovery Miles 39 420 Ships in 12 - 17 working days

Cyber-physical systems (CPSs) have quickly become one of the hottest computer applications today. With their tight integration of cyber and physical objects, it is believed CPSs will transform how we interact with the physical world, just like the Internet transformed how we interact with one another. A CPS could be a system at multiple scales, from large smart bridges with fluctuation detection and responding functions, to autonomous cars and tiny implanted medical devices. Cyber-Physical Systems: Integrated Computing and Engineering Design supplies comprehensive coverage of the principles and design of CPSs. It addresses the many challenges that must be overcome and outlines a roadmap of how to get there. Emphasizes the integration of cyber computing and physical objects control Covers important CPS theory foundations and models Includes interesting case studies of several important civilian and health care applications that illustrate the CPS design process Addresses the collaboration of the sensing and controlling of a physical system with robust software architecture Explains how to account for random failure events that can occur in a real CPS environment Presented in a systematic manner, the book begins by discussing the basic concept underlying CPSs and examining some challenging design issues. It then covers the most important design theories and modeling methods for a practical CPS. Next, it moves on to sensor-based CPSs, which use embedded sensors and actuators to interact with the physical world. The text presents concrete CPS designs for popular civilian applications, including building and energy management. Reflecting the importance of human health care in society, it includes CPS examples of rehabilitation applications such as virtual reality-based disability recovery platforms.

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback)
Brij B. Gupta
R1,421 Discovery Miles 14 210 Ships in 12 - 17 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Conflict and Cooperation in Cyberspace - The Challenge to National Security (Hardcover, New): Panayotis A Yannakogeorgos, Adam... Conflict and Cooperation in Cyberspace - The Challenge to National Security (Hardcover, New)
Panayotis A Yannakogeorgos, Adam B Lowther
R3,192 Discovery Miles 31 920 Ships in 12 - 17 working days

Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, it offers a well-reasoned study of how to prepare for war, while attempting to keep the peace in the cyberspace domain. The discussion begins with thoughtful contributions concerning the attributes and importance of cyberspace to the American way of life and global prosperity. Examining the truths and myths behind recent headline-grabbing malicious cyber activity, the book spells out the challenges involved with establishing a robust system of monitoring, controls, and sanctions to ensure cooperation amongst all stakeholders. The desire is to create a domain that functions as a trusted and resilient environment that fosters cooperation, collaboration, and commerce. Additionally, the book: Delves into the intricacies and considerations cyber strategists must contemplate before engaging in cyber war Offers a framework for determining the best ways to engage other nations in promoting global norms of behavior Illustrates technologies that can enable cyber arms control agreements Dispels myths surrounding Stuxnet and industrial control systems General Michael V. Hayden, former director of the National Security Agency and the Central Intelligence Agency, begins by explaining why the policymakers, particularly those working on cyber issues, must come to understand the policy implications of a dynamic domain. Expert contributors from the Air Force Research Institute, MIT, the Rand Corporation, Naval Postgraduate School, NSA, USAF, USMC, and others examine the challenges involved with ensuring improved cyber security. Outlining the larger ethical, legal, and policy challenges facing government, the private sector, civil society, and individual users, the book offers plausible solutions on how to create an environment where there is confidence in the ability to assure national security, conduct military operations, and ensure a vibrant and stable global economy.

100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback): Nick Vandome 100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback)
Nick Vandome
R156 Discovery Miles 1 560 Ships in 12 - 17 working days
Antiterrorism and Threat Response - Planning and Implementation (Hardcover, New): Ross Johnson Antiterrorism and Threat Response - Planning and Implementation (Hardcover, New)
Ross Johnson
R3,927 Discovery Miles 39 270 Ships in 12 - 17 working days

One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense's antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book's antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists-setting them off balance and keeping them off balance-thereby disrupting their planning cycle and thwarting attack. The book helps security managers to: Understand the terrorist attack planning cycle Conduct a terrorism threat vulnerability assessment Develop an observation plan and the corresponding verification plan Understand how surveillance detection works Learn how pattern analysis wheels can be used to find weaknesses in security operations Appreciate the role of random antiterrorism measures and learn how to develop them Establish response plans for a wide variety of contingencies related to terrorist attack Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiques. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.

Random Dynamical Systems in Finance (Hardcover, New): Anatoliy Swishchuk, Shafiqul Islam Random Dynamical Systems in Finance (Hardcover, New)
Anatoliy Swishchuk, Shafiqul Islam
R4,070 Discovery Miles 40 700 Ships in 12 - 17 working days

The theory and applications of random dynamical systems (RDS) are at the cutting edge of research in mathematics and economics, particularly in modeling the long-run evolution of economic systems subject to exogenous random shocks. Despite this interest, there are no books available that solely focus on RDS in finance and economics. Exploring this emerging area, Random Dynamical Systems in Finance shows how to model RDS in financial applications.

Through numerous examples, the book explains how the theory of RDS can describe the asymptotic and qualitative behavior of systems of random and stochastic differential/difference equations in terms of stability, invariant manifolds, and attractors. The authors present many models of RDS and develop techniques for implementing RDS as approximations to financial models and option pricing formulas. For example, they approximate geometric Markov renewal processes in ergodic, merged, double-averaged, diffusion, normal deviation, and Poisson cases and apply the obtained results to option pricing formulas.

With references at the end of each chapter, this book provides a variety of RDS for approximating financial models, presents numerous option pricing formulas for these models, and studies the stability and optimal control of RDS. The book is useful for researchers, academics, and graduate students in RDS and mathematical finance as well as practitioners working in the financial industry.

Official (ISC)2 Guide to the CAP CBK (Hardcover, 2nd edition): Patrick D. Howard Official (ISC)2 Guide to the CAP CBK (Hardcover, 2nd edition)
Patrick D. Howard
R2,148 Discovery Miles 21 480 Ships in 9 - 15 working days

Significant developments since the publication of its bestselling predecessor, "Building and Implementing a Security Certification and Accreditation Program, "warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP(r)) Common Body of Knowledge (CBK(r)) and NIST SP 800-37, the Official (ISC)2(r) Guide to the CAP(r) CBK(r), Second Edition provides readers with the tools to effectively secure their IT systems via standard, repeatable processes.
Derived from the author s decades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundation s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly C&A) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book:

  • Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria
  • Explains how to combine disparate processes into a unified risk management methodology
  • Covers all the topics included in the Certified Authorization Professional (CAP(r)) Common Body of Knowledge (CBK(r))
  • Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS
  • Reviews the tasks involved in certifying and accrediting U.S. government information systems

Chapters 1 through 7 describe each of the domains of the (ISC)2(r) CAP(r) CBK(r). This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The book s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your I

Security Risk Models for Cyber Insurance (Hardcover): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Hardcover)
Caroline Baylon, Jose Vila, David Rios Insua
R3,614 Discovery Miles 36 140 Ships in 12 - 17 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Hardcover, New): S. Caroline Taylor, Daniel... Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Hardcover, New)
S. Caroline Taylor, Daniel Joseph Torpy, Dilip K Das
R3,046 Discovery Miles 30 460 Ships in 12 - 17 working days

The movement of humans across borders is increasing exponentially-some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling. Consequently, the policing of human movement within and across borders has been and remains a significant concern to nations. Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism explores the nature of these challenges for police, governments, and citizens at large.

Drawn from keynote and paper presentations at a recent International Police Executive Symposium meeting in Malta, the book presents the work of scholars and practitioners who analyze a variety of topics on the cutting edge of global policing, including:

  • Western attempts to reform the policing of sex tourists in the Philippines and Gambia
  • Policing the flow of people and goods in the port of Rotterdam
  • Policing protestors and what happened at the 2010 G20 Summit in Toronto
  • Mexico's use of the military in its war against drug trafficking
  • Public-private cooperation in the fight against organized crime and terrorism in Australia
  • Recommendations for police reform in Afghanistan
  • Sweden's national counterterrorism unit
  • Treatment of asylum seekers in a privately run detention center in South Africa
  • The policing of human trafficking for the sex trade in sub-Saharan Africa, Vietnam, Australia, and Andhra Pradesh, India

Examining areas of increasing concern to governments and citizens around the world, this timely volume presents critical international perspectives on these ongoing global challenges that threaten the safety of humans worldwide.

The 7 Qualities of Highly Secure Software (Hardcover): Mano Paul The 7 Qualities of Highly Secure Software (Hardcover)
Mano Paul
R1,826 Discovery Miles 18 260 Ships in 12 - 17 working days

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book: Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations Specifies the qualities and skills that are essential for building secure software Highlights the parallels between the habits of effective people and qualities in terms of software security Praise for the Book: This will be required reading for my executives, security team, software architects and lead developers.-David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.-Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.-Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas

A Hacker's Mind - How the Powerful Bend Society's Rules, and How to Bend them Back (Hardcover): Bruce Schneier A Hacker's Mind - How the Powerful Bend Society's Rules, and How to Bend them Back (Hardcover)
Bruce Schneier
R794 R642 Discovery Miles 6 420 Save R152 (19%) Ships in 10 - 15 working days

A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies." And there is an entire industry of "black hat" hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys. In A Hacker's Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyse the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political and legal systems to their advantage, at the expense of everyone else. Once you learn how to notice hacks, you'll start seeing them everywhere-and you'll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you. Unchecked, these hacks threaten to upend our financial markets, weaken our democracy and even affect the way we think. And when artificial intelligence starts thinking like a hacker-at inhuman speed and scale-the results could be catastrophic. But for those who would don the "white hat," we can understand the hacking mindset and rebuild our economic, political and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks and realise a more equitable world.

Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New): Gilbert N. Sorebo, Michael C.... Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New)
Gilbert N. Sorebo, Michael C. Echols
R3,932 Discovery Miles 39 320 Ships in 12 - 17 working days

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid. Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security ExaminersFollowing an overview of the components of the Smart Grid, the book delves into the evolution of security standards and regulations and examines ways in which the Smart Grid might be regulated. The authors discuss the technical details about how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission-the foundation for the delivery of electricity, along with distributed generation, micro-grids, and operations. The book explores future concepts-such as energy storage and the use of plug-in electric vehicles (PEVs)-in addition to the concomitant risk for fraud and manipulation with stored energy. Consumer-related issues are discussed as they pertain to emerging ways of receiving and generating energy. The book examines dysfunctions ranging from inadvertent outages to cyber-attack and presents recommendations on how to respond to these incidents. It concludes with speculation of future cyber-security challenges and discusses new ways that the grid can be defended, such as better key management and protection. Written in a style rigorous enough for the practitioner yet accessible to a broad audience, this comprehensive volume covers a topic that is becoming more critical to industry and consumers everywhere.

Cybersecurity for Industrial Control Systems - SCADA, DCS, PLC, HMI, and SIS (Hardcover): Tyson Macaulay, Bryan L. Singer Cybersecurity for Industrial Control Systems - SCADA, DCS, PLC, HMI, and SIS (Hardcover)
Tyson Macaulay, Bryan L. Singer
R2,440 Discovery Miles 24 400 Ships in 12 - 17 working days

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

Data Mining Tools for Malware Detection (Hardcover): Mehedy Masud, Latifur Khan, Bhavani Thuraisingham Data Mining Tools for Malware Detection (Hardcover)
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
R3,656 Discovery Miles 36 560 Ships in 12 - 17 working days

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.

The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.

  • Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining
  • Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web
  • Describes the authors tools for stream data mining

From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

Information Technology Control and Audit, Fifth Edition (Paperback, 5th edition): Angel R. Otero Information Technology Control and Audit, Fifth Edition (Paperback, 5th edition)
Angel R. Otero
R1,395 Discovery Miles 13 950 Ships in 12 - 17 working days

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.

Effective Crime Reduction Strategies - International Perspectives (Paperback): James F. Albrecht, Dilip K Das Effective Crime Reduction Strategies - International Perspectives (Paperback)
James F. Albrecht, Dilip K Das
R1,474 Discovery Miles 14 740 Ships in 12 - 17 working days

The International Police Executive Symposium (IPES, www.ipes.info) coordinates annual international conferences to evaluate critical issues in policing and recommend practical solutions to law enforcement executives deployed across the globe. Drawn from the 2005 proceedings hosted by the Czech Republic in Prague, Effective Crime Reduction Strategies: International Perspectives contains contributions from the renowned criminal justice and law enforcement professionals who gathered at this elite annual meeting. Dedicated to continued reduction in crime through local and global response, these international experts share effective crime-fighting principles and tried and proven best practices. Thoroughly revised and updated since the initial proceedings, the reports in this volume are divided into six sections which explore a host of essential topics: Critical Issues in European Law Enforcement: Highlights efforts in Hungary, Austria, and Norway to revise policies and organizational structures to meet the demands of developing events and political pressures Contemporary Concerns: Policing in the United States and Canada: Analyzes the impact of international terrorism and transnational crime on police work Paradigm Shifts: Policing as Democracy Evolves: Evaluates the success of democratic reforms in South Africa, Brazil, Argentina, Nigeria, and Cameroon Revising Traditional Law Enforcement in Asia to Meet Contemporary Demands: Describes how counterterrorism, cultural ideology, and transnational criminal influence affects the traditional nature of policing in New Zealand, Turkey, Indonesia, and Thailand The Positive Influence of Unionization on Police Professionalism: Addresses the impact of police associations on management decision-making and policy development in the United States, Canada, New Zealand, and South Africa

Information Security Management Handbook, Volume 5 (Hardcover, 6th edition): Micki Krause Nozaki, Harold F. Tipton Information Security Management Handbook, Volume 5 (Hardcover, 6th edition)
Micki Krause Nozaki, Harold F. Tipton
R4,257 Discovery Miles 42 570 Ships in 12 - 17 working days

Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning. The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hacking For Dummies, 7th Edition
K Beaver Paperback R703 R501 Discovery Miles 5 010
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,036 Discovery Miles 10 360
Software Deployment, Updating, and…
Bill Stackpole, Patrick Hanrion Paperback R1,792 Discovery Miles 17 920
Data Localization Laws and Policy - The…
W. Kuan Hon Hardcover R4,337 Discovery Miles 43 370
8 Steps to Better Security - A Simple…
K Crawley Paperback R524 Discovery Miles 5 240
AWS Certified Security Study Guide…
Santana Paperback R1,115 Discovery Miles 11 150
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,097 R886 Discovery Miles 8 860
Cisco CyberOps Associate CBROPS 200-201…
Omar Santos Hardcover R1,368 Discovery Miles 13 680
Securing Remote Access in Palo Alto…
Tom Piens Paperback R1,273 Discovery Miles 12 730
Wireless Security Architecture…
J Minella Paperback R896 Discovery Miles 8 960

 

Partners