0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (262)
  • R250 - R500 (602)
  • R500+ (5,514)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Guide to Computer Forensics and Investigations (Paperback, 6th edition): Amelia Phillips, Bill Nelson, Christopher Steuart Guide to Computer Forensics and Investigations (Paperback, 6th edition)
Amelia Phillips, Bill Nelson, Christopher Steuart
R1,315 R1,177 Discovery Miles 11 770 Save R138 (10%) Ships in 10 - 15 working days

Master the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides free demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.

Trends in Corrections - Interviews with Corrections Leaders Around the World, Volume Two (Paperback): Martha Henderson Hurley,... Trends in Corrections - Interviews with Corrections Leaders Around the World, Volume Two (Paperback)
Martha Henderson Hurley, Dilip K Das
R1,044 Discovery Miles 10 440 Ships in 12 - 17 working days

The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great diversity that exists cross-culturally in the political, social, and economic context of the correctional system. Presenting transcribed interviews of corrections leaders, it offered a comprehensive survey of correctional programming and management styles used across nations. The general conclusion drawn from the inaugural publication was that the correctional leaders interviewed exhibited striking similarities despite vast differences in the social and political climates in which they worked. They all appeared to struggle with some of the same issues. With a fresh set of interviews exploring further cross-cultural differences and similarities, Volume Two extends the reach to several new countries, including Slovenia, Slovakia, Northern Ireland, Switzerland, and France. The interviews are conducted by scholars or practitioners with intimate knowledge of correctional practice and who are familiar with the correctional system in the country of the interviewees. They expand the knowledge base by asking correction leaders specifically about the impact of the economic downturn on corrections in each country, the changes in correctional practice they've experienced, and how they think about and evaluate trends and developments. This revealing series affords correctional leaders an unprecedented opportunity to express their views on current practices and the future of corrections in their countries, facilitating the development of solutions to corrections challenges worldwide. This book is a volume in the Interviews with Global Leaders in Policing, Courts and Corrections series.

CISO Soft Skills - Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives (Hardcover): Ron... CISO Soft Skills - Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives (Hardcover)
Ron Collette, Michael Gentile, Skye Gentile
R2,170 Discovery Miles 21 700 Ships in 12 - 17 working days

As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations. While these items are very important, they are only half of the equation necessary to ensure security success. CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives presents tools that empower security practitioners to identify the intangible negative influencers of security that plague most organizations, and provides techniques to identify, minimize, and overcome these pitfalls.

The book begins by explaining how using the wrong criteria to measure security can result in a claim of adequate security when objective assessment demonstrates this not to be the case. The authors instead recommend that organizations measure the success of their efforts using a practical approach that illustrates both the tangible and intangible requirements needed by a healthy security effort.

The middle section discusses the root causes that negatively influence both a CISO and an organization 's ability to truly secure itself. These root causes include:

  • Employee apathy
  • Employee myopia or tunnel vision
  • Employee primacy, often exhibited as office politics
  • The infancy of the information security discipline

These chapters explain what a CISO can do about these security constraints, providing numerous practical and actionable exercises, tools, and techniques to identify, limit, and compensate for the influence of security constraints in any type of organization.

The final chapters discuss some proactive techniques that CISOs can utilize to effectively secure challenging work environments. Reflecting the experience and solutions of those that are in the trenches of modern organizations, this volume provides practical ideas that can make a difference in the daily lives of security practitioners.

How to Develop and Implement a Security Master Plan (Hardcover): Timothy Giles How to Develop and Implement a Security Master Plan (Hardcover)
Timothy Giles
R3,633 Discovery Miles 36 330 Ships in 12 - 17 working days

Engage Stakeholders with a Long-Term Solution

The goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.

The solution: Develop a meticulously detailed long-term plan that sells decision-makers on the dire need for your program, and then maps out its direction and required budget.

Assess and Outline Security Risks to Map Out Mitigation Strategies
This practical guide details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization's particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. This guide provides tested, real-world solutions on how to:

  • Conduct an effective, efficient assessment of the site and security personnel, meticulously addressing the particular needs of many different environments
  • Make decisions about security philosophies, strategies, contract relationships, technology, and equipment replacement
  • Interview executive and security management to determine their concerns, educate them, and ensure that they buy in to your plan
  • Use all gathered data to construct and finalize the Security Master Plan and then implement it into the management of the business

Apply Insights from an Expert with Global Experience at the Highest Level
Author Tim Giles worked at IBM for 31 years serving as Director of Security for the company's operations in the United States and Canada, as well as Latin America and Asia-Pacific. His immeasurable experience and insight provide readers with an extraordinarily comprehensive understanding that they can use to design and execute a highly effective, tailored security program.

Introduction to Network Security (Hardcover, New): Douglas Jacobson Introduction to Network Security (Hardcover, New)
Douglas Jacobson
R2,989 Discovery Miles 29 890 Ships in 12 - 17 working days

Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.

The book begins with a brief discussion of network architectures and the functions of layers in a typical network. It then examines vulnerabilities and attacks divided into four categories: header-, protocol-, authentication-, and traffic-based. The author next explores the physical, network, and transport layers of each network as well as the security of several common network applications. The last section recommends several network-based security solutions that can be successfully deployed.

This book uses a define-attack-defend methodology for network security. The author briefly introduces the relevant protocols and follows up with detailed descriptions of known vulnerabilities and possible attack methods. He delineates the threats against the protocol and presents possible solutions. Sample problems and lab experiments based on the concepts allow readers to experiment with attacks and assess the effectiveness of solutions. Two appendices provide further clarification and a companion website is offered which supplements the material.

While most of the books available on this subject focus solely on cryptographic techniques to mitigate attacks, this volume recognizes the limitations of this methodology and considers a wider range of security problems and solutions. By focusing on a practical view of network security and examining actual protocols, readers can better understand the vulnerabilities and develop appropriate countermeasures.

Managing Cybersecurity Risk - Book 3 (Paperback): Jonathan Reuvid Managing Cybersecurity Risk - Book 3 (Paperback)
Jonathan Reuvid
R1,189 R937 Discovery Miles 9 370 Save R252 (21%) Ships in 12 - 17 working days
Digital Forensics Explained (Paperback, 2nd edition): Greg Gogolin Digital Forensics Explained (Paperback, 2nd edition)
Greg Gogolin
R1,620 Discovery Miles 16 200 Ships in 9 - 15 working days

This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations are also described from both prosecution and defense perspectives. Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations. The book is a valuable resource for the academic environment, law enforcement, those in the legal profession, and those working in the cyber security field. Case reviews include cyber security breaches, anti-forensic challenges, child exploitation, and social media investigations. Greg Gogolin, PhD, CISSP, is a Professor of Information Security and Intelligence at Ferris State University and a licensed Professional Investigator. He has worked more than 100 cases in criminal, civil, and corporate environments.

Digital Technologies in Teaching and Learning Strategies - Proceedings of DTTLS-2021 (Paperback, 1st ed. 2022): Alexandr... Digital Technologies in Teaching and Learning Strategies - Proceedings of DTTLS-2021 (Paperback, 1st ed. 2022)
Alexandr Lyapin, Olga Kalinina
R4,179 Discovery Miles 41 790 Ships in 12 - 17 working days

This book demonstrates the benefits and drawbacks of using digital technology in preparing online lessons and educational activities. The experience of the last year has shown that online education is becoming a priority. This gave impetus to the creation and development of a new generation of equipment for online education. The book presents latest innovative technologies and modern digital trends in the field of information and communication technology for online education, including personalized learning, neuro-information systems, mobile learning, development of software and hardware infrastructure, and the use of robotics technologies. Key technologies for managing risk and cybersecurity, such as cloud and data security, identity and trust convolution systems, computational intelligence and cryptography techniques, malware and attack analysis, are presented. The topic of cybersecurity is one of the most important issues in the modern digital world. The results of the research on recently developed software, decision support systems, and cloud technologies make a huge contribution to the development of information technology in the context of digitalization. This book is of interest for developers of applications and programs for online education, for software and hardware suppliers who want to keep up with the times and reorient existing IT systems for use in online education.

How Things Work - The Technology Edition (Paperback): Charles F. Bowman How Things Work - The Technology Edition (Paperback)
Charles F. Bowman
R1,423 Discovery Miles 14 230 Ships in 9 - 15 working days

* Provides simple, conceptual descriptions of everyday technologies * Includes clear examples and diagrams that demonstrate the principles and techniques, not just a "how-to" punch list * Covers advanced topics for readers who want to dive into the deep end of the technology pool * Avoids jargon-where terminology does appear, the text will provide clear, concise definitions

Security in Distributed, Grid, Mobile, and Pervasive Computing (Hardcover): Yang Xiao Security in Distributed, Grid, Mobile, and Pervasive Computing (Hardcover)
Yang Xiao
R2,864 R2,569 Discovery Miles 25 690 Save R295 (10%) Ships in 12 - 17 working days

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.

Wireless Security and Cryptography - Specifications and Implementations (Hardcover): Nicolas Sklavos, Xinmiao Zhang Wireless Security and Cryptography - Specifications and Implementations (Hardcover)
Nicolas Sklavos, Xinmiao Zhang; Contributions by Odysseas Koufopavlou, Vesna Hassler, Paris Kitsos, …
R4,530 Discovery Miles 45 300 Ships in 12 - 17 working days

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.

Practical Hacking Techniques and Countermeasures (Paperback): Mark D Spivey Practical Hacking Techniques and Countermeasures (Paperback)
Mark D Spivey
R2,954 Discovery Miles 29 540 Ships in 12 - 17 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware(R) Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Information Security - Design, Implementation, Measurement, and Compliance (Hardcover): Timothy P Layton Information Security - Design, Implementation, Measurement, and Compliance (Hardcover)
Timothy P Layton
R3,630 Discovery Miles 36 300 Ships in 12 - 17 working days

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context.

Practical Risk Management for the CIO (Paperback): Mark  Scherling Practical Risk Management for the CIO (Paperback)
Mark Scherling
R1,731 Discovery Miles 17 310 Ships in 12 - 17 working days

The growing complexity of today's interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive boardroom as a strategic asset. And, just like the tip of an iceberg is all you see until you run into it, the risks to your information are mostly invisible until disaster strikes. Detailing procedures to help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through improvements to information management and information security. It provides easy-to-follow guidance on how to effectively manage the flow of information and incorporate both service delivery and reliability. Explains why every CIO should be managing his or her information differently Provides time-tested risk ranking strategies Considers information security strategy standards such as NIST, FISMA, PCI, SP 800, & ISO 17799 Supplies steps for managing: information flow, classification, controlled vocabularies, life cycle, and data leakage Describes how to put it all together into a complete information risk management framework Information is one of your most valuable assets. If you aren't on the constant lookout for better ways to manage it, your organization will inevitably suffer. Clarifying common misunderstandings about the risks in cyberspace, this book provides the foundation required to make more informed decisions and effectively manage, protect, and deliver information to your organization and its constituents.

Unnoticed in the Casual Light of Day - Phillip Larkin and the Plain Style (Hardcover): Tijana Stojkovic Unnoticed in the Casual Light of Day - Phillip Larkin and the Plain Style (Hardcover)
Tijana Stojkovic
R4,214 Discovery Miles 42 140 Ships in 12 - 17 working days

Larkin's poems are often regarded as falling somewhere between the traditional 'plain' and the more contemporary 'postmodern' categories. This study undertakes a comprehensive linguistic and historical study of the plain style tradition in poetry, its relationship with so-called 'difficult' poetry, and its particular realization in the cultural and historical context of 20th-century Britain. The author examines the nature of poetry as a type of discourse, the elements of, and factors in, the development of literary styles, a close rhetorical examination of Larkin's poems within the described poetic frameworks, and his position in the British twentieth-century poetic canon.

Network Attacks and Defenses - A Hands-on Approach (Paperback): Zouheir Trabelsi, Kadhim Hayawi, Arwa  Al Braiki, Sujith Samuel... Network Attacks and Defenses - A Hands-on Approach (Paperback)
Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
R1,742 Discovery Miles 17 420 Ships in 12 - 17 working days

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laboratory environment. Topics covered in the labs include: Content Addressable Memory (CAM) table poisoning attacks on network switches Address Resolution Protocol (ARP) cache poisoning attacks The detection and prevention of abnormal ARP traffic Network traffic sniffing and the detection of Network Interface Cards (NICs) running in promiscuous mode Internet Protocol-Based Denial-of-Service (IP-based DoS) attacks Reconnaissance traffic Network traffic filtering and inspection Common mechanisms used for router security and device hardening Internet Protocol Security Virtual Private Network (IPsec VPN) security solution protocols, standards, types, and deployments Remote Access IPsec VPN security solution architecture and its design, components, architecture, and implementations These practical exercises go beyond theory to allow students to better anatomize and elaborate offensive and defensive techniques. Educators can use the model scenarios described in this book to design and implement innovative hands-on security exercises. Students who master the techniques in this book will be well armed to counter a broad range of network security threats.

Managing Trust in Cyberspace (Paperback): Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Managing Trust in Cyberspace (Paperback)
Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey
R1,803 Discovery Miles 18 030 Ships in 12 - 17 working days

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,709 Discovery Miles 17 090 Ships in 12 - 17 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Guide to Optimal Operational Risk and BASEL II (Hardcover): Ioannis S. Akkizidis, Vivianne Bouchereau Guide to Optimal Operational Risk and BASEL II (Hardcover)
Ioannis S. Akkizidis, Vivianne Bouchereau
R3,655 Discovery Miles 36 550 Ships in 12 - 17 working days

Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements. This volume provides detailed guidance for the design and implementation of an efficient operational risk management system. It contains all elements of assessment, including operational risk identification, measurement, modeling, and monitoring analysis, along with evaluation analysis and the estimation of capital requirements. The authors also address the managing and controlling of operational risks including operational risk profiling, risk optimization, cost & optimal resource allocation, decision-making, and design of optimal risk policies. Divided into four parts, this book begins by introducing the idea of operational risks and how they affect financial organizations. This section also focuses on the main aspects of managing operational risks. The second part focuses on the requirements of an operational risk management framework according to the Basel II Accord. The third part focuses on all stages of operational risk assessment, and the fourth part focuses on the control and management stages. All of these stages combine to implement efficient and optimal operational risk management systems.

Practical Data Security - Applied Information Technology (Hardcover): John Gordon Practical Data Security - Applied Information Technology (Hardcover)
John Gordon
R2,884 Discovery Miles 28 840 Ships in 12 - 17 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover): Michael Gentile, Ron Collette, Thomas D. August The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover)
Michael Gentile, Ron Collette, Thomas D. August
R4,220 Discovery Miles 42 200 Ships in 12 - 17 working days

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.

Protecting Critical Infrastructures Against Cyber-Attack (Paperback): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Paperback)
Stephen Lukasik
R808 Discovery Miles 8 080 Ships in 12 - 17 working days

The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks (Hardcover): R.R. Brooks Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks (Hardcover)
R.R. Brooks
R4,382 Discovery Miles 43 820 Ships in 12 - 17 working days

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security. Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.

Critical Infrastructure Protection XV - 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15-16,... Critical Infrastructure Protection XV - 15th IFIP WG 11.10 International Conference, ICCIP 2021, Virtual Event, March 15-16, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Jason Staggs, Sujeet Shenoi
R2,146 Discovery Miles 21 460 Ships in 12 - 17 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Industrial Control Systems Security; Telecommunications Systems Security; Infrastructure Security. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of 13 edited papers from the Fifteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held as a virtual event during the spring of 2021. Critical Infrastructure Protection XV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover)
James S. Tiller
R3,643 Discovery Miles 36 430 Ships in 12 - 17 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.

The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization.

Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Encyclopedia of Information Assurance…
Rebecca Herold, Marcus K. Rogers Hardcover R35,657 Discovery Miles 356 570
Enterprise Level Security 1 & 2
Kevin Foltz, William R. Simpson Paperback R1,394 Discovery Miles 13 940
8 Steps to Better Security - A Simple…
K Crawley Paperback R524 Discovery Miles 5 240
Hacking For Dummies, 7th Edition
K Beaver Paperback R703 R501 Discovery Miles 5 010
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,036 Discovery Miles 10 360
(ISC)(2) CISSP Certified Information…
M. Chapple Paperback R1,344 Discovery Miles 13 440
What Is Cybersecurity For?
Tim Stevens Paperback R266 Discovery Miles 2 660
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,097 R886 Discovery Miles 8 860
AWS Certified Security Study Guide…
Santana Paperback R1,115 Discovery Miles 11 150
Principles of Information Security
Herbert Mattord, Michael Whitman Paperback R1,274 R1,145 Discovery Miles 11 450

 

Partners