0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,094)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.): Christoph Boehm, Maximilian Hofer Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.)
Christoph Boehm, Maximilian Hofer
R4,190 R3,389 Discovery Miles 33 890 Save R801 (19%) Ships in 10 - 15 working days

In "Physical Unclonable Functions in Theory and Practice," the authorspresent an in-depth overview ofvarious topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits.

Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit s perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement resultsDifferent error rate reducing pre-selection techniques

This monographgives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic."

Building Secure Business Models Through Blockchain Technology - Tactics, Methods, Limitations, and Performance (Hardcover):... Building Secure Business Models Through Blockchain Technology - Tactics, Methods, Limitations, and Performance (Hardcover)
Shweta Dewangan, Sapna Singh Kshatri, Astha Bhanot, Mushtaq Ahmed Shah
R6,221 Discovery Miles 62 210 Ships in 18 - 22 working days

Blockchain technology provided a buzz-seeking opportunity for all industries to implement improved corporate procedures and trust-building. Still, some industries, such as the banking sector, may view it as a disruptive technology that must be adopted. A transaction ledger's contents can be verified, maintained, and synchronized by community members using blockchain technology. A transaction can never be changed or removed from the blockchain; updates may only be made by participants in the system. Its distributed database cannot be manipulated, disrupted, or hacked in the same manner as conventional, user-controlled access systems and centralized databases. Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance studies and explores the status of blockchain technology and, through the latest technology, builds business models to secure the future direction in the field of business. This book discusses the tactics and methods, as well as their limitations and performance. Covering topics such as AI-based efficient models, digital technology and services, and financial trading, this premier reference source is a valuable resource for business leaders and managers, IT managers, students and educators of higher education, entrepreneurs, government officials, librarians, researchers, and academicians.

Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017): Suresh Chandra... Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017)
Suresh Chandra Satapathy, Vikrant Bhateja, K Srujan Raju, B. Janakiramaiah
R7,758 Discovery Miles 77 580 Ships in 18 - 22 working days

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

Protecting Your Children from Internet Pornography (Paperback): John D. Foubert Protecting Your Children from Internet Pornography (Paperback)
John D. Foubert
R260 R239 Discovery Miles 2 390 Save R21 (8%) Ships in 4 - 8 working days
Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover): Kenneth J. Knapp Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover)
Kenneth J. Knapp
R4,977 Discovery Miles 49 770 Ships in 18 - 22 working days

Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

Game Console Hacking - Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega (Paperback): Joe Grand, Albert Yarusso Game Console Hacking - Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega (Paperback)
Joe Grand, Albert Yarusso
R1,348 Discovery Miles 13 480 Ships in 10 - 15 working days

The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty," provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.
By definition, video console game players like to have fun. Most of them are addicted to the adrenaline rush associated with "winning," and even more so when the "winning" involves beating the system by discovering the multitude of "cheats" built into most video games. Now, they can have the ultimate adrenaline rush---actually messing around with the soul of the machine and configuring it to behave exactly as the command. This book builds on the motto of "Have Fun While Voiding Your Warranty" and will appeal to the community of hardware geeks who associate unscrewing the back of their video console with para-jumping into the perfect storm.
* Providing a reliable, field-tested guide to hacking all of the most popular video gaming consoles.
* Written by some of the most knowledgeable and recognizable names in the hardware hacking community.
* Game Console Hacking is the first book on the market to show game enthusiasts (self described hardware geeks) how to disassemble, reconfigure, customize and re-purpose their Atari, Sega, Nintendo, Playstation and Xbox systems.

Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.): Ulrich Flegel Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.)
Ulrich Flegel
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,125 Discovery Miles 41 250 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New): Raghu Santanam Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New)
Raghu Santanam
R4,568 Discovery Miles 45 680 Ships in 18 - 22 working days

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.

Spyware and Adware (Hardcover, 2011 ed.): John Aycock Spyware and Adware (Hardcover, 2011 ed.)
John Aycock
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

"Spyware and Adware" introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

"Spyware and Adware" is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R1,531 Discovery Miles 15 310 Ships in 9 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R2,098 Discovery Miles 20 980 Ships in 18 - 22 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity, availability, anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Managing Cybersecurity Risk - Book 3 (Paperback): Jonathan Reuvid Managing Cybersecurity Risk - Book 3 (Paperback)
Jonathan Reuvid
R1,118 R923 Discovery Miles 9 230 Save R195 (17%) Ships in 10 - 15 working days
Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Operating System Forensics (Paperback): Ric Messier Operating System Forensics (Paperback)
Ric Messier
R1,573 R1,490 Discovery Miles 14 900 Save R83 (5%) Ships in 10 - 15 working days

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.):... Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.)
Ghazi Ben Ayed
R3,824 R3,294 Discovery Miles 32 940 Save R530 (14%) Ships in 10 - 15 working days

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author's vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019): Zhong-Hua... Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019)
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.

Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion,... Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings (Hardcover)
Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou
R2,764 Discovery Miles 27 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,659 Discovery Miles 26 590 Ships in 18 - 22 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.): David A. Elizondo, Agusti Solanas, Antoni... Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.)
David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste
R4,033 Discovery Miles 40 330 Ships in 18 - 22 working days

The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.

Privacy and Anonymity in Information Management Systems - New Techniques for New Practical Problems (Hardcover, 2010): Jordi... Privacy and Anonymity in Information Management Systems - New Techniques for New Practical Problems (Hardcover, 2010)
Jordi Nin, Javier Herranz
R4,121 Discovery Miles 41 210 Ships in 18 - 22 working days

As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth's population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information age stopped being an empty buzzword. But small is not necessarily beautiful. We now live in a global village and, alas, some (often very powerful) voices state that we ought not expect any more privacy in it. Should this be true, we would have created our own nightmare: a global village combining the worst of conventional villages, where a lot of information on an individual is known by the other villagers, and conventional big cities, where the invidual feels lost in a grim and potentially dangerous place. Whereas security is essential for organizations to survive, individuals and so- times even companies also need some privacy to develop comfortably and lead a free life. This is the reason why individual privacy is mentioned in the Univ- sal Declaration of Human Rights (1948) and data privacy is protected by law in most Western countries. Indeed, without privacy, the rest of fundamental rights, like freedom of speech and democracy, are impaired. The outstanding challenge is to create technology that implements those legal guarantees in a way compatible with functionality and security. This book edited by Dr. Javier Herranz and Dr.

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework (Paperback): Henry Dalziel, Ajin... Automated Security Analysis of Android and iOS Applications with Mobile Security Framework (Paperback)
Henry Dalziel, Ajin Abraham
R1,098 Discovery Miles 10 980 Ships in 18 - 22 working days

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

Blockchain and Cryptocurrencies (Hardcover): Asma Salman, Muthanna G. Abdul Razzaq Blockchain and Cryptocurrencies (Hardcover)
Asma Salman, Muthanna G. Abdul Razzaq
R3,057 Discovery Miles 30 570 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R947 R826 Discovery Miles 8 260
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R7,962 Discovery Miles 79 620
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Cloud Security - Concepts…
Information Reso Management Association Hardcover R8,951 Discovery Miles 89 510
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R3,116 Discovery Miles 31 160

 

Partners