0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (262)
  • R250 - R500 (576)
  • R500+ (5,277)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Strategic Approaches to Digital Platform Security Assurance (Hardcover): Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves... Strategic Approaches to Digital Platform Security Assurance (Hardcover)
Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, Dennis Verslegers
R5,892 Discovery Miles 58 920 Ships in 12 - 17 working days

Nowadays it is impossible to imagine a business without technology as most industries are becoming ""smarter"" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and ""platform""-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.

Security in Computer and Information Sciences (Hardcover): Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios Security in Computer and Information Sciences (Hardcover)
Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios
R1,409 Discovery Miles 14 090 Ships in 10 - 15 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover)
Information R Management Association
R13,188 Discovery Miles 131 880 Ships in 12 - 17 working days
Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,943 Discovery Miles 99 430 Ships in 10 - 15 working days
8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback): K Crawley 8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback)
K Crawley
R526 Discovery Miles 5 260 Ships in 12 - 17 working days

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Cross-Industry Applications of Cyber Security Frameworks (Hardcover): Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman,... Cross-Industry Applications of Cyber Security Frameworks (Hardcover)
Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
R6,834 Discovery Miles 68 340 Ships in 12 - 17 working days

Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Cross-Industry Applications of Cyber Security Frameworks provides an understanding of the specific, standards-based security controls that make up a best practice cybersecurity program. It is equipped with cross-industry applications of cybersecurity frameworks, best practices for common practices, and suggestions that may be highly relevant or appropriate in every case. Covering topics such as legal frameworks, cybersecurity in FinTech, and open banking, this premier reference source is an essential resource for executives, business leaders, managers, entrepreneurs, IT professionals, government officials, hospital administrators, educational administrators, privacy specialists, researchers, and academicians.

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover)
Information R Management Association
R13,183 Discovery Miles 131 830 Ships in 12 - 17 working days
Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover)
Adam Dodson
R609 R515 Discovery Miles 5 150 Save R94 (15%) Ships in 10 - 15 working days
Ethical Hacking - The Ultimate Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks... Ethical Hacking - The Ultimate Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks for Beginners, Including Tips on Social Engineering (Hardcover)
Lester Evans
R740 R629 Discovery Miles 6 290 Save R111 (15%) Ships in 10 - 15 working days
Smart Cities Cybersecurity and Privacy (Paperback): Danda B. Rawat, Kayhan Zrar Ghafoor Smart Cities Cybersecurity and Privacy (Paperback)
Danda B. Rawat, Kayhan Zrar Ghafoor
R2,638 Discovery Miles 26 380 Ships in 12 - 17 working days

Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city's physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications.

Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R579 R501 Discovery Miles 5 010 Save R78 (13%) Ships in 10 - 15 working days
Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems (Hardcover): Michael A. Yastrebenetsky,... Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems (Hardcover)
Michael A. Yastrebenetsky, Vyacheslav S. Kharchenko
R5,912 Discovery Miles 59 120 Ships in 12 - 17 working days

Safety and security are crucial to the operations of nuclear power plants, but cyber threats to these facilities are increasing significantly. Instrumentation and control systems, which play a vital role in the prevention of these incidents, have seen major design modifications with the implementation of digital technologies. Advanced computing systems are assisting in the protection and safety of nuclear power plants; however, significant research on these computational methods is deficient. Cyber Security and Safety of Nuclear Power Plant Instrumentation and Control Systems is a pivotal reference source that provides vital research on the digital developments of instrumentation and control systems for assuring the safety and security of nuclear power plants. While highlighting topics such as accident monitoring systems, classification measures, and UAV fleets, this publication explores individual cases of security breaches as well as future methods of practice. This book is ideally designed for engineers, industry specialists, researchers, policymakers, scientists, academicians, practitioners, and students involved in the development and operation of instrumentation and control systems for nuclear power plants, chemical and petrochemical industries, transport, and medical equipment.

Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback): Jeffrey... Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback)
Jeffrey A. Lee
R567 Discovery Miles 5 670 Ships in 12 - 17 working days

In Online Predators, An Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings his ten plus years' experience in the fight against online child exploitation to bear in an easy to follow guide for all with a stake in the life of a child. This book equips parents, guardians, extended family, and educational professionals with practical strategies to help keep kids safe in a technology connected world. Instead of focusing on ever changing technology, Lee proposes a key fundamental change in the fight against online predation-to develop an insatiable curiosity about their child's online life, then get in the front lines and stay there.

Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,462 Discovery Miles 104 620 Ships in 10 - 15 working days
Secure Cyber-Physical Systems for Smart Cities (Hardcover): Riaz Ahmed Shaikh Secure Cyber-Physical Systems for Smart Cities (Hardcover)
Riaz Ahmed Shaikh
R6,161 Discovery Miles 61 610 Ships in 12 - 17 working days

Interest in developing smart cities has grown exponentially over the years with many governments across the world hoping to initiate these projects in their own countries. One of the key challenges for the success of any smart city project is the assurance of smart security and privacy of the citizens. Due to the use of a wide range of interconnected cyber-physical systems, traditional security solutions cannot be applied to smart city applications, and new practices must be sought. Secure Cyber-Physical Systems for Smart Cities is an essential reference publication that examines information security and privacy in smart city settings including discussions on new security frameworks, solutions, cybersecurity laws and regulations, and risk management frameworks for smart city environments. Covering a wide range of topics including wireless networks, security, and cyber-physical systems, this book is ideally designed for IT specialists and consultants, engineers, government officials, policymakers, researchers, academicians, and industry professionals.

Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,462 Discovery Miles 104 620 Ships in 10 - 15 working days
Advanced Technologies of Quantum Key Distribution (Hardcover): Sergiy Gnatyuk Advanced Technologies of Quantum Key Distribution (Hardcover)
Sergiy Gnatyuk
R3,413 Discovery Miles 34 130 Ships in 10 - 15 working days
Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover): Brij B. Gupta Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover)
Brij B. Gupta
R5,889 Discovery Miles 58 890 Ships in 12 - 17 working days

In today's modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.

Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover): Mehdi Khosrowpour Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover)
Mehdi Khosrowpour
R7,830 Discovery Miles 78 300 Ships in 12 - 17 working days

Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover): Gregory B White,... Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover)
Gregory B White, Natalie Sjelin
R5,872 Discovery Miles 58 720 Ships in 10 - 15 working days

As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.

Antiterrorism and Threat Response - Planning and Implementation (Paperback): Ross Johnson Antiterrorism and Threat Response - Planning and Implementation (Paperback)
Ross Johnson
R1,926 Discovery Miles 19 260 Ships in 12 - 17 working days

One of the single greatest challenges to security professionals in the 21st century is terrorism. In the last several years, we have heard a lot about the importance of preparing for terrorist attacks. This book offers a way to prevent terrorist attacks. Providing security managers with a clear and simple methodology to protect their organizations, Antiterrorism and Threat Response uses an adaptation of the U.S. Department of Defense's antiterrorism fundamentals and applies it to the private sector to protect companies, facilities, and infrastructures. The book's antiterrorism planning strategies enable security professionals to seize the initiative away from terrorists-setting them off balance and keeping them off balance-thereby disrupting their planning cycle and thwarting attack. The book helps security managers to: Understand the terrorist attack planning cycle Conduct a terrorism threat vulnerability assessment Develop an observation plan and the corresponding verification plan Understand how surveillance detection works Learn how pattern analysis wheels can be used to find weaknesses in security operations Appreciate the role of random antiterrorism measures and learn how to develop them Establish response plans for a wide variety of contingencies related to terrorist attack Adapt this methodology to maritime operations against piracy, individual protection, and travel security in high-risk environments Work with other security departments, the police, and the public to create infrastructure protection zones that will enhance the detection of suspicious events and reduce the likelihood of terrorist attack The book aims to show that terrorists are not defeated by technology alone, but instead by collaboration and the timely passage of relevant information and intelligence. Terrorism is, above all, an act of communication. The terrorists communicate to us through their acts and their carefully crafted communiques. Security professionals need to send the terrorists a clear and simple message in the language they understand: You will not succeed here.

Hackable - How to Do Application Security Right (Hardcover): Ted Harrington Hackable - How to Do Application Security Right (Hardcover)
Ted Harrington
R628 Discovery Miles 6 280 Ships in 12 - 17 working days
Multidisciplinary Approach to Modern Digital Steganography (Hardcover): Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith... Multidisciplinary Approach to Modern Digital Steganography (Hardcover)
Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz
R5,892 Discovery Miles 58 920 Ships in 12 - 17 working days

Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.

Research Anthology on Advancements in Cybersecurity Education (Hardcover): Information Resources Management Association Research Anthology on Advancements in Cybersecurity Education (Hardcover)
Information Resources Management Association
R11,772 Discovery Miles 117 720 Ships in 10 - 15 working days

Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. From banking to medical records to e-commerce, sensitive data has never before been at such a high risk of misuse. As such, organizations now have a greater responsibility than ever to ensure that their stakeholder data is secured, leading to the increased need for cybersecurity specialists and the development of more secure software and systems. To avoid issues such as hacking and create a safer online space, cybersecurity education is vital and not only for those seeking to make a career out of cybersecurity, but also for the general public who must become more aware of the information they are sharing and how they are using it. It is crucial people learn about cybersecurity in a comprehensive and accessible way in order to use the skills to better protect all data. The Research Anthology on Advancements in Cybersecurity Education discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data. Providing information on a range of topics from cybersecurity education requirements, cyberspace security talents training systems, and insider threats, it is ideal for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.

On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R707 Discovery Miles 7 070 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
PCI Dss: A Pocket Guide
IT Governance Paperback R375 Discovery Miles 3 750
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R650 Discovery Miles 6 500
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R8,843 Discovery Miles 88 430
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R7,113 R6,566 Discovery Miles 65 660
The Cybersecurity Mindset - A Virtual…
Dewayne Hart Hardcover R750 Discovery Miles 7 500
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,565 Discovery Miles 65 650
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050
CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,343 Discovery Miles 13 430
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870

 

Partners