0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (596)
  • R500+ (5,136)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Security Log Management - Identifying Patterns in the Chaos (Paperback): Jacob Babbin Security Log Management - Identifying Patterns in the Chaos (Paperback)
Jacob Babbin
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site.
Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.
* Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network
* Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site.
* Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks"

Economics of Information Security and Privacy (Hardcover, 2010 Ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Hardcover, 2010 Ed.)
Tyler Moore, David Pym, Christos Ioannidis
R5,322 Discovery Miles 53 220 Ships in 18 - 22 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

Research Anthology on Artificial Intelligence Applications in Security, VOL 3 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 3 (Hardcover)
Information Reso Management Association
R9,819 Discovery Miles 98 190 Ships in 18 - 22 working days
Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.): Enrico Nardelli, Sabina... Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.)
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo
R2,812 Discovery Miles 28 120 Ships in 18 - 22 working days

This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management," and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada)."

Building Robots With Lego Mindstorms (Paperback): Mario Ferrari, Guilio Ferrari Building Robots With Lego Mindstorms (Paperback)
Mario Ferrari, Guilio Ferrari
R1,056 Discovery Miles 10 560 Ships in 10 - 15 working days

Lego robots Mindstorms are sweeping the world and fans need to learn how to programme them
Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs. Since Lego launched Lego Mindstorms in late 1998 sales have skyrocketed - with no sign of slowing down. Mindstorms have captured the imagination of adults and children alike, creating a subculture of Mindstorm enthusiasts around the world. The kits are now a staple part of engineering and computer science classes at many high profile Universities.
Building Robots with Lego Mindstorms provides readers with a fundamental understanding of the geometry, electronics, engineering, and programming required to build your own robots. Mario and Giulio Ferrari are world-renowned experts in the field of Lego Mindstorms robotics, and in this book they share their unrivaled knowledge and expertise of robotics as well as provide a series of chapters detailing how to design and build the most exotic robots. Mario and Giulio also give detailed explanations of how to integrate Lego Mindstorms kits with other Lego programmable bricks such asScout and Cybermaster, as well as with non-robotic Lego Technics models.

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives (Paperback): Eric Cole, Michael Nordfelt, Sandra Ring,... Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives (Paperback)
Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair
R1,343 Discovery Miles 13 430 Ships in 18 - 22 working days

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services.
*Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level.
*Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,047 Discovery Miles 50 470 Ships in 18 - 22 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019): Mohammad S. Obaidat, Issa Traore, Isaac Woungang Biometric-Based Physical and Cybersecurity Systems (Hardcover, 1st ed. 2019)
Mohammad S. Obaidat, Issa Traore, Isaac Woungang
R4,123 Discovery Miles 41 230 Ships in 18 - 22 working days

This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.

Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover): Manish Gupta, Raj Sharman Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover)
Manish Gupta, Raj Sharman
R4,971 Discovery Miles 49 710 Ships in 18 - 22 working days

"More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem. Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."

Trusted Computing (Hardcover, illustrated edition): Chris Mitchell Trusted Computing (Hardcover, illustrated edition)
Chris Mitchell
R2,841 Discovery Miles 28 410 Ships in 10 - 15 working days

As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules. This new text introduces recent technological developments in trusted computing, and surveys the various current approaches to providing trusted platforms. It also includes application examples based on recent and ongoing research. The core of the book is based on an open workshop on Trusted Computing, held at Royal Holloway, University of London, UK.

Essentials of Blockchain Technology (Hardcover): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Hardcover)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R2,631 Discovery Miles 26 310 Ships in 10 - 15 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Secure Key Establishment (Hardcover, 1st Edition.
2nd Printing. 2008): Kim-Kwang Raymond Choo Secure Key Establishment (Hardcover, 1st Edition. 2nd Printing. 2008)
Kim-Kwang Raymond Choo
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Ten Laws for Security (Hardcover, 1st ed. 2016): Eric Diehl Ten Laws for Security (Hardcover, 1st ed. 2016)
Eric Diehl
R2,438 Discovery Miles 24 380 Ships in 10 - 15 working days

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover): Gianluca Cornetta, Abdellah... Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies (Hardcover)
Gianluca Cornetta, Abdellah Touhafi, Gabriel-Miro Muntean
R6,020 Discovery Miles 60 200 Ships in 18 - 22 working days

The adoption of cloud and IoT technologies in both the industrial and academic communities has enabled the discovery of numerous applications and ignited countless new research opportunities. With numerous professional markets benefiting from these advancements, it is easy to forget the non-technical issues that accompany technologies like these. Despite the advantages that these systems bring, significant ethical questions and regulatory issues have become prominent areas of discussion. Social, Legal, and Ethical Implications of IoT, Cloud, and Edge Computing Technologies is a pivotal reference source that provides vital research on the non-technical repercussions of IoT technology adoption. While highlighting topics such as smart cities, environmental monitoring, and data privacy, this publication explores the regulatory and ethical risks that stem from computing technologies. This book is ideally designed for researchers, engineers, practitioners, students, academicians, developers, policymakers, scientists, and educators seeking current research on the sociological impact of cloud and IoT technologies.

Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016): Iosif I. Androulidakis Mobile Phone Security and Forensics - A Practical Approach (Hardcover, 2nd ed. 2016)
Iosif I. Androulidakis
R3,522 R2,415 Discovery Miles 24 150 Save R1,107 (31%) Ships in 10 - 15 working days

This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.

Online Business Security Systems (Hardcover, 2007 ed.): Godfried B. Williams Online Business Security Systems (Hardcover, 2007 ed.)
Godfried B. Williams
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Recent Progress in Biometrics (Hardcover): Jose Mabry Recent Progress in Biometrics (Hardcover)
Jose Mabry
R3,031 R2,746 Discovery Miles 27 460 Save R285 (9%) Ships in 18 - 22 working days
Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017): H. R. Vishwakarma, Shyam Akashe Computing and Network Sustainability - Proceedings of IRSCNS 2016 (Hardcover, 1st ed. 2017)
H. R. Vishwakarma, Shyam Akashe
R6,473 Discovery Miles 64 730 Ships in 10 - 15 working days

The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.): Clive Blackwell, Hong Zhu Cyberpatterns - Unifying Design Patterns with Security and Attack Patterns (Hardcover, 2014 ed.)
Clive Blackwell, Hong Zhu
R3,424 R1,924 Discovery Miles 19 240 Save R1,500 (44%) Ships in 10 - 15 working days

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover)
Harris Schwartz
R786 Discovery Miles 7 860 Ships in 18 - 22 working days
Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014): Graeme Proudler, Liqun Chen, Chris Dalton Trusted Computing Platforms - TPM2.0 in Context (Hardcover, 1st ed. 2014)
Graeme Proudler, Liqun Chen, Chris Dalton
R4,853 Discovery Miles 48 530 Ships in 10 - 15 working days

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019): Liang Xiao, Weihua Zhuang, Sheng Zhou,... Learning-based VANET Communication and Security Techniques (Hardcover, 1st ed. 2019)
Liang Xiao, Weihua Zhuang, Sheng Zhou, Cailian Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.

SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R892 R810 Discovery Miles 8 100 Save R82 (9%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Measurements and their Uncertainties - A…
Ifan Hughes, Thomas Hase Hardcover R2,694 Discovery Miles 26 940
The Finite Element Method for Fluid…
Olek C. Zienkiewicz, R.L. Taylor, … Hardcover R2,908 R2,735 Discovery Miles 27 350
Statistical Mechanics, Molecular…
Roger Fosdick, E. Fried Hardcover R2,651 Discovery Miles 26 510
Unifying Themes in Complex Systems IX…
Alfredo J. Morales, Carlos Gershenson, … Hardcover R5,438 R4,847 Discovery Miles 48 470
Multi-Level Methods in Lubrication…
C.H. Venner, A. A. Lubrecht Hardcover R3,341 Discovery Miles 33 410
Fluid Mechanics N5
Paperback R462 Discovery Miles 4 620
Microfluidics - Modeling, Mechanics and…
Bastian E. Rapp Paperback R6,385 Discovery Miles 63 850
Solid-Liquid Separation
Ladislav Svarovsky Hardcover R3,449 Discovery Miles 34 490
Stochastic Tools in Mathematics and…
Alexandre J. Chorin, Ole H. Hald Hardcover R2,344 Discovery Miles 23 440
Key Factors of Combustion - From…
Nikolai M. Rubtsov Hardcover R4,155 R3,354 Discovery Miles 33 540

 

Partners