0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,097)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Cyber-Physical Systems Security (Hardcover, 2018 ed.): Cetin Kaya Koc Cyber-Physical Systems Security (Hardcover, 2018 ed.)
Cetin Kaya Koc
R4,056 Discovery Miles 40 560 Ships in 18 - 22 working days

The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.

Research Anthology on Artificial Intelligence Applications in Security, VOL 3 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 3 (Hardcover)
Information Reso Management Association
R9,819 Discovery Miles 98 190 Ships in 18 - 22 working days
Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.): Enrico Nardelli, Sabina... Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.)
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo
R2,812 Discovery Miles 28 120 Ships in 18 - 22 working days

This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management," and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada)."

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,047 Discovery Miles 50 470 Ships in 18 - 22 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Economics of Information Security and Privacy (Hardcover, 2010 Ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Hardcover, 2010 Ed.)
Tyler Moore, David Pym, Christos Ioannidis
R5,322 Discovery Miles 53 220 Ships in 18 - 22 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

Implementing Computational Intelligence Techniques for Security Systems Design (Hardcover): Yousif Abdullatif Albastaki, Wasan... Implementing Computational Intelligence Techniques for Security Systems Design (Hardcover)
Yousif Abdullatif Albastaki, Wasan Awad
R5,318 Discovery Miles 53 180 Ships in 18 - 22 working days

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives (Paperback): Eric Cole, Michael Nordfelt, Sandra Ring,... Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives (Paperback)
Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair
R1,343 Discovery Miles 13 430 Ships in 18 - 22 working days

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services.
*Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level.
*Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.

Building Robots With Lego Mindstorms (Paperback): Mario Ferrari, Guilio Ferrari Building Robots With Lego Mindstorms (Paperback)
Mario Ferrari, Guilio Ferrari
R1,056 Discovery Miles 10 560 Ships in 10 - 15 working days

Lego robots Mindstorms are sweeping the world and fans need to learn how to programme them
Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs. Since Lego launched Lego Mindstorms in late 1998 sales have skyrocketed - with no sign of slowing down. Mindstorms have captured the imagination of adults and children alike, creating a subculture of Mindstorm enthusiasts around the world. The kits are now a staple part of engineering and computer science classes at many high profile Universities.
Building Robots with Lego Mindstorms provides readers with a fundamental understanding of the geometry, electronics, engineering, and programming required to build your own robots. Mario and Giulio Ferrari are world-renowned experts in the field of Lego Mindstorms robotics, and in this book they share their unrivaled knowledge and expertise of robotics as well as provide a series of chapters detailing how to design and build the most exotic robots. Mario and Giulio also give detailed explanations of how to integrate Lego Mindstorms kits with other Lego programmable bricks such asScout and Cybermaster, as well as with non-robotic Lego Technics models.

Essentials of Blockchain Technology (Hardcover): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Hardcover)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R2,631 Discovery Miles 26 310 Ships in 10 - 15 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover): Manish Gupta, Raj Sharman Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover)
Manish Gupta, Raj Sharman
R4,971 Discovery Miles 49 710 Ships in 18 - 22 working days

"More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem. Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."

Secure Key Establishment (Hardcover, 1st Edition.
2nd Printing. 2008): Kim-Kwang Raymond Choo Secure Key Establishment (Hardcover, 1st Edition. 2nd Printing. 2008)
Kim-Kwang Raymond Choo
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019): Liang Xiao, Weihua Zhuang, Sheng Zhou,... Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019)
Liang Xiao, Weihua Zhuang, Sheng Zhou, Cailian Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.

Ten Laws for Security (Hardcover, 1st ed. 2016): Eric Diehl Ten Laws for Security (Hardcover, 1st ed. 2016)
Eric Diehl
R2,438 Discovery Miles 24 380 Ships in 10 - 15 working days

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover): Gianluca Cornetta, Abdellah... Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover)
Gianluca Cornetta, Abdellah Touhafi, Gabriel-Miro Muntean
R6,020 Discovery Miles 60 200 Ships in 18 - 22 working days

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

Online Business Security Systems (Hardcover, 2007 ed.): Godfried B. Williams Online Business Security Systems (Hardcover, 2007 ed.)
Godfried B. Williams
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016): Iosif I. Androulidakis Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016)
Iosif I. Androulidakis
R3,522 R2,415 Discovery Miles 24 150 Save R1,107 (31%) Ships in 10 - 15 working days

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

Recent Progress in Biometrics (Hardcover): Jose Mabry Recent Progress in Biometrics (Hardcover)
Jose Mabry
R3,031 R2,746 Discovery Miles 27 460 Save R285 (9%) Ships in 18 - 22 working days
Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017): H. R. Vishwakarma, Shyam Akashe Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017)
H. R. Vishwakarma, Shyam Akashe
R6,473 Discovery Miles 64 730 Ships in 10 - 15 working days

The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.): Clive Blackwell, Hong Zhu Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.)
Clive Blackwell, Hong Zhu
R3,424 R1,924 Discovery Miles 19 240 Save R1,500 (44%) Ships in 10 - 15 working days

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover)
Harris Schwartz
R786 Discovery Miles 7 860 Ships in 18 - 22 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R892 R810 Discovery Miles 8 100 Save R82 (9%) Ships in 18 - 22 working days
Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R503 Discovery Miles 5 030 Ships in 18 - 22 working days
Recent Advances in Face Recognition (Hardcover): Kresimir Delac, Mislav Grgic, Sonja Grgic Recent Advances in Face Recognition (Hardcover)
Kresimir Delac, Mislav Grgic, Sonja Grgic
R3,113 Discovery Miles 31 130 Ships in 18 - 22 working days
Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,754 Discovery Miles 27 540 Ships in 18 - 22 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R5,948 Discovery Miles 59 480 Ships in 18 - 22 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Evaluating Websites and Web Services
Denis Yannacopoulos, Panagiotis Manolitzas, … Hardcover R5,413 Discovery Miles 54 130
Java Card E-Payment Application…
Vesna Hassler, Etc, … Hardcover R2,113 Discovery Miles 21 130
Artificial Intelligence Technologies and…
Tomayess Issa, Pedro Isaias Hardcover R5,697 Discovery Miles 56 970
Fullstack D3 and Data Visualization…
Amelia Wattenberger Hardcover R2,500 Discovery Miles 25 000
Designing Embedded Internet Devices
Brian DeMuth, Dan Eisenreich Paperback R1,530 Discovery Miles 15 300
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid Paperback R1,332 Discovery Miles 13 320
Fundamental Networking in Java
Esmond Pitt Hardcover R1,619 Discovery Miles 16 190
An Introduction to XML Query Processing…
Jiaheng Lu Hardcover R3,747 R3,446 Discovery Miles 34 460
Intro to Python for Computer Science and…
Paul Deitel Paperback R1,815 R1,474 Discovery Miles 14 740
DelphiMVCFramework - the official guide…
Daniele Teti Hardcover R1,363 Discovery Miles 13 630

 

Partners