0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (613)
  • R500+ (5,095)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.)
Wenliang Du
R1,874 Discovery Miles 18 740 Ships in 10 - 15 working days
Smart Cities Cybersecurity and Privacy (Paperback): Danda B. Rawat, Kayhan Zrar Ghafoor Smart Cities Cybersecurity and Privacy (Paperback)
Danda B. Rawat, Kayhan Zrar Ghafoor
R2,553 Discovery Miles 25 530 Ships in 10 - 15 working days

Smart Cities Cybersecurity and Privacy examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in hardware and software, have fueled the rapid growth and deployment of ubiquitous connectivity between a city's physical and cyber components. This connectivity however also opens up many security vulnerabilities that must be mitigated. Smart Cities Cybersecurity and Privacy helps researchers, engineers, and city planners develop adaptive, robust, scalable, and reliable security and privacy smart city applications that can mitigate the negative implications associated with cyber-attacks and potential privacy invasion. It provides insights into networking and security architectures, designs, and models for the secure operation of smart city applications.

Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover): Brij B. Gupta Modern Principles, Practices, and Algorithms for Cloud Security (Hardcover)
Brij B. Gupta
R5,324 Discovery Miles 53 240 Ships in 18 - 22 working days

In today's modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.

Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover): Mehdi Khosrowpour Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Hardcover)
Mehdi Khosrowpour
R7,137 Discovery Miles 71 370 Ships in 18 - 22 working days

Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks (Hardcover): K Martin Sagayam, Bharat Bhushan, A.... Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks (Hardcover)
K Martin Sagayam, Bharat Bhushan, A. Diana Andrushia; Contributions by Victor Hugo C. de Albuquerque
R5,452 Discovery Miles 54 520 Ships in 18 - 22 working days

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.

Secure Cyber-Physical Systems for Smart Cities (Hardcover): Riaz Ahmed Shaikh Secure Cyber-Physical Systems for Smart Cities (Hardcover)
Riaz Ahmed Shaikh
R5,572 Discovery Miles 55 720 Ships in 18 - 22 working days

Interest in developing smart cities has grown exponentially over the years with many governments across the world hoping to initiate these projects in their own countries. One of the key challenges for the success of any smart city project is the assurance of smart security and privacy of the citizens. Due to the use of a wide range of interconnected cyber-physical systems, traditional security solutions cannot be applied to smart city applications, and new practices must be sought. Secure Cyber-Physical Systems for Smart Cities is an essential reference publication that examines information security and privacy in smart city settings including discussions on new security frameworks, solutions, cybersecurity laws and regulations, and risk management frameworks for smart city environments. Covering a wide range of topics including wireless networks, security, and cyber-physical systems, this book is ideally designed for IT specialists and consultants, engineers, government officials, policymakers, researchers, academicians, and industry professionals.

Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover)
Adam Dodson
R546 R500 Discovery Miles 5 000 Save R46 (8%) Ships in 18 - 22 working days
Advanced Technologies of Quantum Key Distribution (Hardcover): Sergiy Gnatyuk Advanced Technologies of Quantum Key Distribution (Hardcover)
Sergiy Gnatyuk
R3,089 Discovery Miles 30 890 Ships in 18 - 22 working days
Security and Privacy Issues in Sensor Networks and IoT (Hardcover): Priyanka Ahlawat, Mayank Dave Security and Privacy Issues in Sensor Networks and IoT (Hardcover)
Priyanka Ahlawat, Mayank Dave
R5,330 Discovery Miles 53 300 Ships in 18 - 22 working days

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. Security and Privacy Issues in Sensor Networks and IoT is a collection of innovative research on the methods and applications of protection disputes in the internet of things and other computing structures. While highlighting topics that include cyber defense, digital forensics, and intrusion detection, this book is ideally designed for security analysts, IT specialists, software developers, computer engineers, industry professionals, academicians, students, and researchers seeking current research on defense concerns in cyber physical systems.

Ethical Hacking - The Ultimate Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks... Ethical Hacking - The Ultimate Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks for Beginners, Including Tips on Social Engineering (Hardcover)
Lester Evans
R664 R593 Discovery Miles 5 930 Save R71 (11%) Ships in 18 - 22 working days
Hacking Into Computer Systems - - A Beginners Guide (Paperback): Rubin Heath Hacking Into Computer Systems - - A Beginners Guide (Paperback)
Rubin Heath
R517 Discovery Miles 5 170 Ships in 18 - 22 working days
Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover): Romil Rawat, Upinder Kaur, Shadab... Using Computational Intelligence for the Dark Web and Illicit Behavior Detection (Hardcover)
Romil Rawat, Upinder Kaur, Shadab Pasha Khan, Ranjana Sikarwar, K. Sakthidasan Sankaran
R6,212 Discovery Miles 62 120 Ships in 18 - 22 working days

The Dark Web is a known hub that hosts myriad illegal activities behind the veil of anonymity for its users. For years now, law enforcement has been struggling to track these illicit activities and put them to an end. However, the depth and anonymity of the Dark Web has made these efforts difficult, and as cyber criminals have more advanced technologies available to them, the struggle appears to only have the potential to worsen. Law enforcement and government organizations also have emerging technologies on their side, however. It is essential for these organizations to stay up to date on these emerging technologies, such as computational intelligence, in order to put a stop to the illicit activities and behaviors presented in the Dark Web. Using Computational Intelligence for the Dark Web and Illicit Behavior Detection presents the emerging technologies and applications of computational intelligence for the law enforcement of the Dark Web. It features analysis into cybercrime data, examples of the application of computational intelligence in the Dark Web, and provides future opportunities for growth in this field. Covering topics such as cyber threat detection, crime prediction, and keyword extraction, this premier reference source is an essential resource for government organizations, law enforcement agencies, non-profit organizations, politicians, computer scientists, researchers, students, and academicians.

Cryptography - Recent Advances and Future Developments (Hardcover): Riccardo Bernardini Cryptography - Recent Advances and Future Developments (Hardcover)
Riccardo Bernardini
R3,068 Discovery Miles 30 680 Ships in 18 - 22 working days
Security in Vehicular Networks - Focus on Location  and Identity Privacy (Hardcover): L Benarous Security in Vehicular Networks - Focus on Location and Identity Privacy (Hardcover)
L Benarous
R3,490 Discovery Miles 34 900 Ships in 18 - 22 working days

Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover)
Information R Management Association
R11,906 Discovery Miles 119 060 Ships in 18 - 22 working days
Impact of Digital Transformation on Security Policies and Standards (Hardcover): Sam Goundar, S. Bharath Bhushan, Vaishali... Impact of Digital Transformation on Security Policies and Standards (Hardcover)
Sam Goundar, S. Bharath Bhushan, Vaishali Ravindra Thakare
R5,936 Discovery Miles 59 360 Ships in 18 - 22 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Security Breaches and Threat Prevention in the Internet of Things (Hardcover): N. Jeyanthi, R. Thandeeswaran Security Breaches and Threat Prevention in the Internet of Things (Hardcover)
N. Jeyanthi, R. Thandeeswaran
R4,514 Discovery Miles 45 140 Ships in 18 - 22 working days

As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R680 Discovery Miles 6 800 Ships in 18 - 22 working days
Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover): Gregory B White,... Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) (Hardcover)
Gregory B White, Natalie Sjelin
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeable networks and significant amounts of data at once. Implementing overarching security policies for software systems is integral to protecting community-wide data from harmful attacks. Establishing Cyber Security Programs Through the Community Cyber Security Maturity Model (CCSMM) is an essential reference source that discusses methods in applying sustainable cybersecurity programs and policies within organizations, governments, and other communities. Featuring research on topics such as community engagement, incident planning methods, and information sharing, this book is ideally designed for cybersecurity professionals, security analysts, managers, researchers, policymakers, students, practitioners, and academicians seeking coverage on novel policies and programs in cybersecurity implementation.

Multidisciplinary Approach to Modern Digital Steganography (Hardcover): Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith... Multidisciplinary Approach to Modern Digital Steganography (Hardcover)
Sabyasachi Pramanik, Mangesh Manikrao Ghonge, Renjith V. Ravi, Korhan Cengiz
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.

Cross-Industry Applications of Cyber Security Frameworks (Hardcover): Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman,... Cross-Industry Applications of Cyber Security Frameworks (Hardcover)
Sukanta Kumar Baral, Richa Goel, Md.Mashiur Rahman, Jahangir Sultan, Sarkar Jahan
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Cross-Industry Applications of Cyber Security Frameworks provides an understanding of the specific, standards-based security controls that make up a best practice cybersecurity program. It is equipped with cross-industry applications of cybersecurity frameworks, best practices for common practices, and suggestions that may be highly relevant or appropriate in every case. Covering topics such as legal frameworks, cybersecurity in FinTech, and open banking, this premier reference source is an essential resource for executives, business leaders, managers, entrepreneurs, IT professionals, government officials, hospital administrators, educational administrators, privacy specialists, researchers, and academicians.

AWS Certified Advanced Networking Specialty Workbook - Exam: ANS C00 (Paperback): Ip Specialist AWS Certified Advanced Networking Specialty Workbook - Exam: ANS C00 (Paperback)
Ip Specialist
R534 Discovery Miles 5 340 Ships in 10 - 15 working days
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover): Arif Sari Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover)
Arif Sari
R4,875 Discovery Miles 48 750 Ships in 18 - 22 working days

Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.

Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover)
Information R Management Association
R13,766 Discovery Miles 137 660 Ships in 18 - 22 working days
Hackable - How to Do Application Security Right (Hardcover): Ted Harrington Hackable - How to Do Application Security Right (Hardcover)
Ted Harrington
R668 R607 Discovery Miles 6 070 Save R61 (9%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cloud Computing for Data-Intensive…
Xiaolin Li, Judy Qiu Hardcover R4,354 R3,548 Discovery Miles 35 480
High-Performance Big-Data Analytics…
Pethuru Raj, Anupama Raman, … Hardcover R3,826 R3,565 Discovery Miles 35 650
Web-Scale Data Management for the Cloud
Wolfgang Lehner, Kai-Uwe Sattler Hardcover R3,307 Discovery Miles 33 070
Event Mining for Explanatory Modeling
Laleh Jalali, Ramesh Jain Hardcover R1,302 Discovery Miles 13 020
Green Symbiotic Cloud Communications
H. D. Mustafa, Shabbir N. Merchant, … Hardcover R2,653 Discovery Miles 26 530
Mechanism Transitions in…
Bjoern Richerzhagen Hardcover R2,653 Discovery Miles 26 530
Applying AI-Based IoT Systems to…
Bhatia Madhulika, Bhatia Surabhi, … Hardcover R6,677 Discovery Miles 66 770
Ranking Queries on Uncertain Data
Ming Hua, Jian Pei Hardcover R3,796 Discovery Miles 37 960
Machine Learning and Data Mining
I Kononenko, M Kukar Paperback R1,903 Discovery Miles 19 030
Distributed User Interfaces - Designing…
Jose A. Gallud, Ricardo Tesoriero, … Hardcover R2,658 Discovery Miles 26 580

 

Partners