0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (600)
  • R500+ (5,148)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach (Hardcover, 1st ed.... Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach (Hardcover, 1st ed. 2018)
Simon Parkinson, Andrew Crampton, Richard Hill
R1,576 Discovery Miles 15 760 Ships in 18 - 22 working days

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition (Paperback, 3rd Edition): M. Chapple (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition (Paperback, 3rd Edition)
M. Chapple
R1,290 R1,082 Discovery Miles 10 820 Save R208 (16%) Ships in 10 - 15 working days

The only official study guide for the new CCSP exam objectives effective from 2022-2025 (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. In this completely rewritten 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Cloud Concepts, Architecture and Design, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Cloud Security Operations, and Legal, Risk, and Compliance with real-world scenarios to help you apply your skills along the way. The CCSP credential from (ISC)2 and the Cloud Security Alliance is designed to show employers that you have what it takes to keep their organization safe in the cloud. Learn the skills you need to be confident on exam day and beyond. Review 100% of all CCSP exam objectives Practice applying essential concepts and skills Access the industry-leading online study tool set Test your knowledge with bonus practice exams and more As organizations become increasingly reliant on cloud-based IT, the threat to data security looms larger. Employers are seeking qualified professionals with a proven cloud security skillset, and the CCSP credential brings your resume to the top of the pile. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide gives you the tools and information you need to earn that certification and apply your skills in a real-world setting.

Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017): Suresh Chandra... Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017)
Suresh Chandra Satapathy, Vikrant Bhateja, K Srujan Raju, B. Janakiramaiah
R7,758 Discovery Miles 77 580 Ships in 18 - 22 working days

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

Building Secure Business Models Through Blockchain Technology - Tactics, Methods, Limitations, and Performance (Hardcover):... Building Secure Business Models Through Blockchain Technology - Tactics, Methods, Limitations, and Performance (Hardcover)
Shweta Dewangan, Sapna Singh Kshatri, Astha Bhanot, Mushtaq Ahmed Shah
R6,819 Discovery Miles 68 190 Ships in 18 - 22 working days

Blockchain technology provided a buzz-seeking opportunity for all industries to implement improved corporate procedures and trust-building. Still, some industries, such as the banking sector, may view it as a disruptive technology that must be adopted. A transaction ledger's contents can be verified, maintained, and synchronized by community members using blockchain technology. A transaction can never be changed or removed from the blockchain; updates may only be made by participants in the system. Its distributed database cannot be manipulated, disrupted, or hacked in the same manner as conventional, user-controlled access systems and centralized databases. Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance studies and explores the status of blockchain technology and, through the latest technology, builds business models to secure the future direction in the field of business. This book discusses the tactics and methods, as well as their limitations and performance. Covering topics such as AI-based efficient models, digital technology and services, and financial trading, this premier reference source is a valuable resource for business leaders and managers, IT managers, students and educators of higher education, entrepreneurs, government officials, librarians, researchers, and academicians.

Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover): Kenneth J. Knapp Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover)
Kenneth J. Knapp
R4,977 Discovery Miles 49 770 Ships in 18 - 22 working days

Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.): Ulrich Flegel Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.)
Ulrich Flegel
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

Spyware and Adware (Hardcover, 2011 ed.): John Aycock Spyware and Adware (Hardcover, 2011 ed.)
John Aycock
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

"Spyware and Adware" introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

"Spyware and Adware" is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R1,531 Discovery Miles 15 310 Ships in 9 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,125 Discovery Miles 41 250 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Managing Cybersecurity Risk - Book 3 (Paperback): Jonathan Reuvid Managing Cybersecurity Risk - Book 3 (Paperback)
Jonathan Reuvid
R1,118 R923 Discovery Miles 9 230 Save R195 (17%) Ships in 10 - 15 working days
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion,... Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings (Hardcover)
Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou
R2,764 Discovery Miles 27 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New): Raghu Santanam Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New)
Raghu Santanam
R4,568 Discovery Miles 45 680 Ships in 18 - 22 working days

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.

Operating System Forensics (Paperback): Ric Messier Operating System Forensics (Paperback)
Ric Messier
R1,573 R1,490 Discovery Miles 14 900 Save R83 (5%) Ships in 10 - 15 working days

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.):... Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.)
Ghazi Ben Ayed
R3,824 R3,294 Discovery Miles 32 940 Save R530 (14%) Ships in 10 - 15 working days

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author's vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019): Zhong-Hua... Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019)
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.

Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.): David A. Elizondo, Agusti Solanas, Antoni... Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.)
David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste
R4,033 Discovery Miles 40 330 Ships in 18 - 22 working days

The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.

Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R2,098 Discovery Miles 20 980 Ships in 18 - 22 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity, availability, anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,659 Discovery Miles 26 590 Ships in 18 - 22 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Blockchain and Cryptocurrencies (Hardcover): Asma Salman, Muthanna G. Abdul Razzaq Blockchain and Cryptocurrencies (Hardcover)
Asma Salman, Muthanna G. Abdul Razzaq
R3,057 Discovery Miles 30 570 Ships in 18 - 22 working days
Dynamic Secrets in Communication Security (Hardcover, 2014 ed.): Sheng Xiao, Weibo Gong, Don Towsley Dynamic Secrets in Communication Security (Hardcover, 2014 ed.)
Sheng Xiao, Weibo Gong, Don Towsley
R2,823 R1,787 Discovery Miles 17 870 Save R1,036 (37%) Ships in 10 - 15 working days

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Cyber Situational Awareness - Issues and Research (Hardcover, 2010 ed.): Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Cyber Situational Awareness - Issues and Research (Hardcover, 2010 ed.)
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang
R2,790 Discovery Miles 27 900 Ships in 18 - 22 working days

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.

Access Control Systems - Security, Identity Management and Trust Models (Hardcover, 2006 ed.): Messaoud Benantar Access Control Systems - Security, Identity Management and Trust Models (Hardcover, 2006 ed.)
Messaoud Benantar
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

Access control is a method of allowing and disallowing certain operations on a computer or network system. This book details access control mechanisms that are emerging with the latest Internet programming technologies. It provides a thorough introduction to the foundations of programming systems security as well as the theory behind access control models. The author explores all models employed and describes how they work.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security of Networks and Services in an…
Daphne Tuncer, Robert Koch, … Hardcover R1,344 Discovery Miles 13 440
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Cyber-Physical Threat Intelligence for…
John Soldatos, Isabel Praca, … Hardcover R3,378 Discovery Miles 33 780
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R5,931 Discovery Miles 59 310
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880

 

Partners