0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (264)
  • R250 - R500 (606)
  • R500+ (5,537)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Antiterrorism and Threat Response - Planning and Implementation (Hardcover, New): Ross Johnson Antiterrorism and Threat Response - Planning and Implementation (Hardcover, New)
Ross Johnson
R3,927 Discovery Miles 39 270 Ships in 12 - 17 working days

One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense's antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book's antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists-setting them off balance and keeping them off balance-thereby disrupting their planning cycle and thwarting attack. The book helps security managers to: Understand the terrorist attack planning cycle Conduct a terrorism threat vulnerability assessment Develop an observation plan and the corresponding verification plan Understand how surveillance detection works Learn how pattern analysis wheels can be used to find weaknesses in security operations Appreciate the role of random antiterrorism measures and learn how to develop them Establish response plans for a wide variety of contingencies related to terrorist attack Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiques. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.

Random Dynamical Systems in Finance (Hardcover, New): Anatoliy Swishchuk, Shafiqul Islam Random Dynamical Systems in Finance (Hardcover, New)
Anatoliy Swishchuk, Shafiqul Islam
R4,070 Discovery Miles 40 700 Ships in 12 - 17 working days

The theory and applications of random dynamical systems (RDS) are at the cutting edge of research in mathematics and economics, particularly in modeling the long-run evolution of economic systems subject to exogenous random shocks. Despite this interest, there are no books available that solely focus on RDS in finance and economics. Exploring this emerging area, Random Dynamical Systems in Finance shows how to model RDS in financial applications.

Through numerous examples, the book explains how the theory of RDS can describe the asymptotic and qualitative behavior of systems of random and stochastic differential/difference equations in terms of stability, invariant manifolds, and attractors. The authors present many models of RDS and develop techniques for implementing RDS as approximations to financial models and option pricing formulas. For example, they approximate geometric Markov renewal processes in ergodic, merged, double-averaged, diffusion, normal deviation, and Poisson cases and apply the obtained results to option pricing formulas.

With references at the end of each chapter, this book provides a variety of RDS for approximating financial models, presents numerous option pricing formulas for these models, and studies the stability and optimal control of RDS. The book is useful for researchers, academics, and graduate students in RDS and mathematical finance as well as practitioners working in the financial industry.

Official (ISC)2 Guide to the CAP CBK (Hardcover, 2nd edition): Patrick D. Howard Official (ISC)2 Guide to the CAP CBK (Hardcover, 2nd edition)
Patrick D. Howard
R2,148 Discovery Miles 21 480 Ships in 9 - 15 working days

Significant developments since the publication of its bestselling predecessor, "Building and Implementing a Security Certification and Accreditation Program, "warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP(r)) Common Body of Knowledge (CBK(r)) and NIST SP 800-37, the Official (ISC)2(r) Guide to the CAP(r) CBK(r), Second Edition provides readers with the tools to effectively secure their IT systems via standard, repeatable processes.
Derived from the author s decades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundation s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly C&A) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book:

  • Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria
  • Explains how to combine disparate processes into a unified risk management methodology
  • Covers all the topics included in the Certified Authorization Professional (CAP(r)) Common Body of Knowledge (CBK(r))
  • Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS
  • Reviews the tasks involved in certifying and accrediting U.S. government information systems

Chapters 1 through 7 describe each of the domains of the (ISC)2(r) CAP(r) CBK(r). This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The book s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your I

100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback): Nick Vandome 100 Top Tips - Stay Safe Online and Protect Your Privacy (Paperback)
Nick Vandome
R156 Discovery Miles 1 560 Ships in 12 - 17 working days
Security Risk Models for Cyber Insurance (Hardcover): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Hardcover)
Caroline Baylon, Jose Vila, David Rios Insua
R3,614 Discovery Miles 36 140 Ships in 12 - 17 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Hardcover, New): S. Caroline Taylor, Daniel... Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Hardcover, New)
S. Caroline Taylor, Daniel Joseph Torpy, Dilip K Das
R3,046 Discovery Miles 30 460 Ships in 12 - 17 working days

The movement of humans across borders is increasing exponentially-some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling. Consequently, the policing of human movement within and across borders has been and remains a significant concern to nations. Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism explores the nature of these challenges for police, governments, and citizens at large.

Drawn from keynote and paper presentations at a recent International Police Executive Symposium meeting in Malta, the book presents the work of scholars and practitioners who analyze a variety of topics on the cutting edge of global policing, including:

  • Western attempts to reform the policing of sex tourists in the Philippines and Gambia
  • Policing the flow of people and goods in the port of Rotterdam
  • Policing protestors and what happened at the 2010 G20 Summit in Toronto
  • Mexico's use of the military in its war against drug trafficking
  • Public-private cooperation in the fight against organized crime and terrorism in Australia
  • Recommendations for police reform in Afghanistan
  • Sweden's national counterterrorism unit
  • Treatment of asylum seekers in a privately run detention center in South Africa
  • The policing of human trafficking for the sex trade in sub-Saharan Africa, Vietnam, Australia, and Andhra Pradesh, India

Examining areas of increasing concern to governments and citizens around the world, this timely volume presents critical international perspectives on these ongoing global challenges that threaten the safety of humans worldwide.

The 7 Qualities of Highly Secure Software (Hardcover): Mano Paul The 7 Qualities of Highly Secure Software (Hardcover)
Mano Paul
R1,826 Discovery Miles 18 260 Ships in 12 - 17 working days

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book: Explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations Specifies the qualities and skills that are essential for building secure software Highlights the parallels between the habits of effective people and qualities in terms of software security Praise for the Book: This will be required reading for my executives, security team, software architects and lead developers.-David W. Stender, CISSP, CSSLP, CAP, CISO of the US Internal Revenue Service Developing highly secure software should be at the forefront of organizational strategy and this book provides a framework to do so.-Troy Leach, CTO, PCI Security Standards Council This book will teach you the core, critical skills needed to raise the security bar on the attackers and swing the game in your favor.-Michael Howard, Principal Cyber Security Program Manager, Microsoft As a penetration tester, my job will be a lot harder as people read this book! -Kevin Johnson, Security Consultant, Secure Ideas

Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New): Gilbert N. Sorebo, Michael C.... Smart Grid Security - An End-to-End View of Security in the New Electrical Grid (Hardcover, New)
Gilbert N. Sorebo, Michael C. Echols
R3,932 Discovery Miles 39 320 Ships in 12 - 17 working days

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid. Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security ExaminersFollowing an overview of the components of the Smart Grid, the book delves into the evolution of security standards and regulations and examines ways in which the Smart Grid might be regulated. The authors discuss the technical details about how metering technology is being implemented and the likely threats and vulnerabilities that utilities will face. They address the home area network (HAN) and examine distribution and transmission-the foundation for the delivery of electricity, along with distributed generation, micro-grids, and operations. The book explores future concepts-such as energy storage and the use of plug-in electric vehicles (PEVs)-in addition to the concomitant risk for fraud and manipulation with stored energy. Consumer-related issues are discussed as they pertain to emerging ways of receiving and generating energy. The book examines dysfunctions ranging from inadvertent outages to cyber-attack and presents recommendations on how to respond to these incidents. It concludes with speculation of future cyber-security challenges and discusses new ways that the grid can be defended, such as better key management and protection. Written in a style rigorous enough for the practitioner yet accessible to a broad audience, this comprehensive volume covers a topic that is becoming more critical to industry and consumers everywhere.

Data Mining Tools for Malware Detection (Hardcover): Mehedy Masud, Latifur Khan, Bhavani Thuraisingham Data Mining Tools for Malware Detection (Hardcover)
Mehedy Masud, Latifur Khan, Bhavani Thuraisingham
R3,656 Discovery Miles 36 560 Ships in 12 - 17 working days

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.

The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.

  • Discusses data mining for emerging applications, including adaptable malware detection, insider threat detection, firewall policy analysis, and real-time data mining
  • Includes four appendices that provide a firm foundation in data management, secure systems, and the semantic web
  • Describes the authors tools for stream data mining

From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.

Cybersecurity for Industrial Control Systems - SCADA, DCS, PLC, HMI, and SIS (Hardcover): Tyson Macaulay, Bryan L. Singer Cybersecurity for Industrial Control Systems - SCADA, DCS, PLC, HMI, and SIS (Hardcover)
Tyson Macaulay, Bryan L. Singer
R2,440 Discovery Miles 24 400 Ships in 12 - 17 working days

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required.
The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

Effective Crime Reduction Strategies - International Perspectives (Paperback): James F. Albrecht, Dilip K Das Effective Crime Reduction Strategies - International Perspectives (Paperback)
James F. Albrecht, Dilip K Das
R1,474 Discovery Miles 14 740 Ships in 12 - 17 working days

The International Police Executive Symposium (IPES, www.ipes.info) coordinates annual international conferences to evaluate critical issues in policing and recommend practical solutions to law enforcement executives deployed across the globe. Drawn from the 2005 proceedings hosted by the Czech Republic in Prague, Effective Crime Reduction Strategies: International Perspectives contains contributions from the renowned criminal justice and law enforcement professionals who gathered at this elite annual meeting. Dedicated to continued reduction in crime through local and global response, these international experts share effective crime-fighting principles and tried and proven best practices. Thoroughly revised and updated since the initial proceedings, the reports in this volume are divided into six sections which explore a host of essential topics: Critical Issues in European Law Enforcement: Highlights efforts in Hungary, Austria, and Norway to revise policies and organizational structures to meet the demands of developing events and political pressures Contemporary Concerns: Policing in the United States and Canada: Analyzes the impact of international terrorism and transnational crime on police work Paradigm Shifts: Policing as Democracy Evolves: Evaluates the success of democratic reforms in South Africa, Brazil, Argentina, Nigeria, and Cameroon Revising Traditional Law Enforcement in Asia to Meet Contemporary Demands: Describes how counterterrorism, cultural ideology, and transnational criminal influence affects the traditional nature of policing in New Zealand, Turkey, Indonesia, and Thailand The Positive Influence of Unionization on Police Professionalism: Addresses the impact of police associations on management decision-making and policy development in the United States, Canada, New Zealand, and South Africa

Information Security Management Handbook, Volume 5 (Hardcover, 6th edition): Micki Krause Nozaki, Harold F. Tipton Information Security Management Handbook, Volume 5 (Hardcover, 6th edition)
Micki Krause Nozaki, Harold F. Tipton
R4,257 Discovery Miles 42 570 Ships in 12 - 17 working days

Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP (R) Common Body of Knowledge (CBK (R)). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning. The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations.

Police and Society in Brazil (Paperback): Vicente Riccio, Wesley G Skogan Police and Society in Brazil (Paperback)
Vicente Riccio, Wesley G Skogan
R1,412 Discovery Miles 14 120 Ships in 12 - 17 working days

In Brazil, where crime is closely associated with social inequality and failure of the criminal justice system, the police are considered by most to be corrupt, inefficient, and violent, especially when occupying poor areas, and they lack the widespread legitimacy enjoyed by police forces in many nations in the northern hemisphere. This text covers hot-button issues like urban pacification squads, gangs, and drugs, as well as practical topics such as policy, dual civil and military models, and gender relations. The latest volume in the renowned Advances in Police Theory and Practice Series, Police and Society in Brazil fills a gap in English literature about policing in a nation that currently ranks sixth in number of homicides. It is a must-read for criminal justice practitioners, as well as students of international policing.

Information Technology Control and Audit, Fifth Edition (Paperback, 5th edition): Angel R. Otero Information Technology Control and Audit, Fifth Edition (Paperback, 5th edition)
Angel R. Otero
R1,395 Discovery Miles 13 950 Ships in 12 - 17 working days

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.

Lattice Basis Reduction - An Introduction to the LLL Algorithm and Its Applications (Hardcover, New): Murray R. Bremner Lattice Basis Reduction - An Introduction to the LLL Algorithm and Its Applications (Hardcover, New)
Murray R. Bremner
R3,346 Discovery Miles 33 460 Ships in 12 - 17 working days

First developed in the early 1980s by Lenstra, Lenstra, and Lov sz, the LLL algorithm was originally used to provide a polynomial-time algorithm for factoring polynomials with rational coefficients. It very quickly became an essential tool in integer linear programming problems and was later adapted for use in cryptanalysis. This book provides an introduction to the theory and applications of lattice basis reduction and the LLL algorithm. With numerous examples and suggested exercises, the text discusses various applications of lattice basis reduction to cryptography, number theory, polynomial factorization, and matrix canonical forms.

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition):... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd edition)
Douglas Landoll
R1,853 Discovery Miles 18 530 Ships in 9 - 15 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

Machine Learning Forensics for Law Enforcement, Security, and Intelligence (Hardcover, New): Jesus Mena Machine Learning Forensics for Law Enforcement, Security, and Intelligence (Hardcover, New)
Jesus Mena
R3,642 Discovery Miles 36 420 Ships in 12 - 17 working days

Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data. To combat this unlawful activity, knowledge about the use of machine learning technology and software is critical. Machine Learning Forensics for Law Enforcement, Security, and Intelligence integrates an assortment of deductive and instructive tools, techniques, and technologies to arm professionals with the tools they need to be prepared and stay ahead of the game.

Step-by-step instructions

The book is a practical guide on how to conduct forensic investigations using self-organizing clustering map (SOM) neural networks, text extraction, and rule generating software to "interrogate the evidence." This powerful data is indispensable for fraud detection, cybersecurity, competitive counterintelligence, and corporate and litigation investigations. The book also provides step-by-step instructions on how to construct adaptive criminal and fraud detection systems for organizations.

Prediction is the key

Internet activity, email, and wireless communications can be captured, modeled, and deployed in order to anticipate potential cyber attacks and other types of crimes. The successful prediction of human reactions and server actions by quantifying their behaviors is invaluable for pre-empting criminal activity. This volume assists chief information officers, law enforcement personnel, legal and IT professionals, investigators, and competitive intelligence analysts in the strategic planning needed to recognize the patterns of criminal activities in order to predict when and where crimes and intrusions are likely to take place.

Data Mining and Machine Learning in Cybersecurity (Hardcover): Sumeet Dua, Xian Du Data Mining and Machine Learning in Cybersecurity (Hardcover)
Sumeet Dua, Xian Du
R2,592 Discovery Miles 25 920 Ships in 12 - 17 working days

With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need. From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges-detailing cutting-edge machine learning and data mining techniques. It also: Unveils cutting-edge techniques for detecting new attacks Contains in-depth discussions of machine learning solutions to detection problems Categorizes methods for detecting, scanning, and profiling intrusions and anomalies Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions Details privacy-preserving data mining methods This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

Security Patch Management (Hardcover): Felicia Nicastro Security Patch Management (Hardcover)
Felicia Nicastro
R2,606 Discovery Miles 26 060 Ships in 12 - 17 working days

Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that's often left to the last minute or resolved with products that automate the task. Effective patch management is not about technology; it's about having a formal process in place that can deploy patches to vulnerable systems quickly. Helping you figure out exactly what to patch and which patches to use, Security Patch Management provides detailed guidance through the process of creating and implementing an effective and efficient patch management process. It uses a format that is easy-to-understand and applicable regardless of the operating system, network device, or patch deployment tool. The author illustrates the proper implementation of patches on devices and systems within various infrastructures to provide the insight required to: Design your own patch release process and keep it action ready Test the effectiveness of your patches Keep up with the latest patch releases Prioritize the vulnerabilities that need to be addressed Apply patches quickly and without draining essential network resources This book supplies the tools and guidelines you need to stay one step ahead of the exploits on the horizon. It will help you establish a patch management process that not only protects your organization against zero-day attacks, but also helps you become more proactive when it comes to this critical facet of information security.

Testing Code Security (Paperback): Maura A. van der Linden Testing Code Security (Paperback)
Maura A. van der Linden
R1,779 Discovery Miles 17 790 Ships in 12 - 17 working days

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.

Honeypots - A New Paradigm to Information Security (Hardcover): R.C. Joshi, Anjali Sardana Honeypots - A New Paradigm to Information Security (Hardcover)
R.C. Joshi, Anjali Sardana
R5,095 Discovery Miles 50 950 Ships in 12 - 17 working days

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

Security and Policy Driven Computing (Hardcover, New): Lei Liu Security and Policy Driven Computing (Hardcover, New)
Lei Liu
R4,513 Discovery Miles 45 130 Ships in 12 - 17 working days

Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention. An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.

Handbook of SCADA/Control Systems Security (Paperback, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Paperback, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R1,294 Discovery Miles 12 940 Ships in 12 - 17 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

Cyber Arms - Security in Cyberspace (Hardcover): Stanislav Abaimov, Maurizio Martellini Cyber Arms - Security in Cyberspace (Hardcover)
Stanislav Abaimov, Maurizio Martellini
R4,942 Discovery Miles 49 420 Ships in 12 - 17 working days

This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure. The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives.

Security of Self-Organizing Networks - MANET, WSN, WMN, VANET (Hardcover): Al-Sakib Khan Pathan Security of Self-Organizing Networks - MANET, WSN, WMN, VANET (Hardcover)
Al-Sakib Khan Pathan
R3,683 Discovery Miles 36 830 Ships in 12 - 17 working days

Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the following chapters. Examining critical security issues in a range of wireless networks, the book proposes specific solutions to security threats. Ideal for those with a basic understanding of network security, the text provides a clear examination of the key aspects of security in self-organizing networks and other networks that use wireless technology for communications. The book is organized into four sections for ease of reference: 1. General Topics -- Security of Wireless and Self-Organizing Networks 2. Mobile Ad-Hoc Network and Vehicular Ad-Hoc Network Security 3. Wireless Sensor Network Security 4. Wireless Mesh Network Security Highlighting potential threats to network security, most chapters are written in a tutorial manner. However, some of the chapters include mathematical equations and detailed analysis for advanced readers. Guiding you through the latest trends, issues, and advances in network security, the text includes questions and sample answers in each chapter to reinforce understanding.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Essentials of Blockchain Technology
Kuan-Ching Li, Xiaofeng Chen, … Hardcover R2,566 Discovery Miles 25 660
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,394 Discovery Miles 13 940
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R622 Discovery Miles 6 220
Principles of Information Security
Herbert Mattord, Michael Whitman Paperback R1,274 R1,145 Discovery Miles 11 450
8 Steps to Better Security - A Simple…
K Crawley Paperback R524 Discovery Miles 5 240
(ISC)2 CCSP Certified Cloud Security…
M. Chapple Paperback R796 Discovery Miles 7 960
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,322 Discovery Miles 13 220
Bootstrapped Millionaire - Defying the…
Tim T Mercer Hardcover R789 R655 Discovery Miles 6 550
Securing Remote Access in Palo Alto…
Tom Piens Paperback R1,273 Discovery Miles 12 730
AWS Certified Security Study Guide…
Santana Paperback R1,422 R1,088 Discovery Miles 10 880

 

Partners