0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,096)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Computer Viruses and Malware (Hardcover, 2006 ed.): John Aycock Computer Viruses and Malware (Hardcover, 2006 ed.)
John Aycock
R3,458 Discovery Miles 34 580 Ships in 18 - 22 working days

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.

Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.

Cyber Security of Industrial Control Systems in the Future Internet Environment (Hardcover): Mirjana D. Stojanovic, Slavica V.... Cyber Security of Industrial Control Systems in the Future Internet Environment (Hardcover)
Mirjana D. Stojanovic, Slavica V. Bostjancic Rakas
R5,363 Discovery Miles 53 630 Ships in 18 - 22 working days

In today's modernized market, many fields are utilizing internet technologies in their everyday methods of operation. The industrial sector is no different as these technological solutions have provided several benefits including reduction of costs, scalability, and efficiency improvements. Despite this, cyber security remains a crucial risk factor in industrial control systems. The same public and corporate solutions do not apply to this specific district because these security issues are more complex and intensive. Research is needed that explores new risk assessment methods and security mechanisms that professionals can apply to their modern technological procedures. Cyber Security of Industrial Control Systems in the Future Internet Environment is a pivotal reference source that provides vital research on current security risks in critical infrastructure schemes with the implementation of information and communication technologies. While highlighting topics such as intrusion detection systems, forensic challenges, and smart grids, this publication explores specific security solutions within industrial sectors that have begun applying internet technologies to their current methods of operation. This book is ideally designed for researchers, system engineers, managers, networkers, IT professionals, analysts, academicians, and students seeking a better understanding of the key issues within securing industrial control systems that utilize internet technologies.

Formal Correctness of Security Protocols (Hardcover, 2007 ed.): Giampaolo Bella Formal Correctness of Security Protocols (Hardcover, 2007 ed.)
Giampaolo Bella
R1,563 Discovery Miles 15 630 Ships in 18 - 22 working days

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.

Security and Quality in Cyber-Physical Systems Engineering - With Forewords by Robert M. Lee and Tom Gilb (Hardcover, 1st ed.... Security and Quality in Cyber-Physical Systems Engineering - With Forewords by Robert M. Lee and Tom Gilb (Hardcover, 1st ed. 2019)
Stefan Biffl, Matthias Eckhart, Arndt Luder, Edgar Weippl
R3,698 Discovery Miles 36 980 Ships in 10 - 15 working days

This book examines the requirements, risks, and solutions to improve the security and quality of complex cyber-physical systems (C-CPS), such as production systems, power plants, and airplanes, in order to ascertain whether it is possible to protect engineering organizations against cyber threats and to ensure engineering project quality. The book consists of three parts that logically build upon each other. Part I "Product Engineering of Complex Cyber-Physical Systems" discusses the structure and behavior of engineering organizations producing complex cyber-physical systems, providing insights into processes and engineering activities, and highlighting the requirements and border conditions for secure and high-quality engineering. Part II "Engineering Quality Improvement" addresses quality improvements with a focus on engineering data generation, exchange, aggregation, and use within an engineering organization, and the need for proper data modeling and engineering-result validation. Lastly, Part III "Engineering Security Improvement" considers security aspects concerning C-CPS engineering, including engineering organizations' security assessments and engineering data management, security concepts and technologies that may be leveraged to mitigate the manipulation of engineering data, as well as design and run-time aspects of secure complex cyber-physical systems. The book is intended for several target groups: it enables computer scientists to identify research issues related to the development of new methods, architectures, and technologies for improving quality and security in multi-disciplinary engineering, pushing forward the current state of the art. It also allows researchers involved in the engineering of C-CPS to gain a better understanding of the challenges and requirements of multi-disciplinary engineering that will guide them in their future research and development activities. Lastly, it offers practicing engineers and managers with engineering backgrounds insights into the benefits and limitations of applicable methods, architectures, and technologies for selected use cases.

Encyclopedia of Information Assurance - 4 Volume Set (Print) (Hardcover): Rebecca Herold, Marcus K. Rogers Encyclopedia of Information Assurance - 4 Volume Set (Print) (Hardcover)
Rebecca Herold, Marcus K. Rogers
R39,414 Discovery Miles 394 140 Ships in 10 - 15 working days

Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia's four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource: Supplies the understanding needed to help prevent the misuse of sensitive information Explains how to maintain the integrity of critical systems Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats. Also Available OnlineThis Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including: Citation tracking and alerts Active reference linking Saved searches and marked lists HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]

Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition): R. Anderson, J. D Dewar Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2nd edition)
R. Anderson, J. D Dewar; Edited by Harold F. Tipton
R2,283 Discovery Miles 22 830 Ships in 10 - 15 working days

The (ISC)(2) (R) Systems Security Certified Practitioner (SSCP (R)) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK (R) has quickly become the book that many of today's security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)(2) CBK. Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text: Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)(2) certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Recent Trends in Computer Applications - Best Studies from the 2017 International Conference on Computer and Applications,... Recent Trends in Computer Applications - Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE (Hardcover, 1st ed. 2018)
Jihad Mohamad Alja'am, Abdulmotaleb El Saddik, Abdul Hamid Sadka
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

This edited volume presents the best chapters presented during the international conference on computer and applications ICCA'17 which was held in Dubai, United Arab Emirates in September 2017. Selected chapters present new advances in digital information, communications and multimedia. Authors from different countries show and discuss their findings, propose new approaches, compare them with the existing ones and include recommendations. They address all applications of computing including (but not limited to) connected health, information security, assistive technology, edutainment and serious games, education, grid computing, transportation, social computing, natural language processing, knowledge extraction and reasoning, Arabic apps, image and pattern processing, virtual reality, cloud computing, haptics, information security, robotics, networks algorithms, web engineering, big data analytics, ontology, constraints satisfaction, cryptography and steganography, Fuzzy logic, soft computing, neural networks, artificial intelligence, biometry and bio-informatics, embedded systems, computer graphics, algorithms and optimization, Internet of things and smart cities. The book can be used by researchers and practitioners to discover the recent trends in computer applications. It opens a new horizon for research discovery works locally and internationally.

The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age... The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age (Hardcover)
Rania Mankarious; Foreword by Laura Berman
R727 Discovery Miles 7 270 Ships in 9 - 17 working days
Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.): Stefan Axelsson, David Sands Understanding Intrusion Detection through Visualization (Hardcover, 2006 ed.)
Stefan Axelsson, David Sands
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

With the ever increasing use of computers for critical systems, computer security that protects data and computer systems from intentional, malicious intervention, continues to attract attention. Among the methods for defense, the application of a tool to help the operator identify ongoing or already perpetrated attacks (intrusion detection), has been the subject of considerable research in the past ten years. A key problem with current intrusion detection systems is the high number of false alarms they produce. Understanding Intrusion Detection Through Visualization presents research on why false alarms are, and will remain a problem; then applies results from the field of information visualization to the problem of intrusion detection. This approach promises to enable the operator to identify false (and true) alarms, while aiding the operator to identify other operational characteristics of intrusion detection systems.

Practical Internet Security (Hardcover, 2007 ed.): John R Vacca Practical Internet Security (Hardcover, 2007 ed.)
John R Vacca
R2,795 Discovery Miles 27 950 Ships in 18 - 22 working days

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats. Each connection magnifies the vulnerability to attack. With the increased connectivity to the Internet and the wide availability of automated cracking tools, organizations can no longer simply rely on operating system security to protect their valuable corporate data. Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security risks to corporate data and information systems.

Practical Internet Security reveals how the Internet is paving the way for secure communications within organizations and on the public Internet. This book provides the fundamental knowledge needed to analyze risks to a system and to implement a security policy that protects information assets from potential intrusion, damage, or theft. It provides dozens of real-life scenarios and examples, as well as hands-on instruction in securing Web communications and sites. You will learn the common vulnerabilities of Web sites; as well as, how to carry out secure communications across unsecured networks. All system administrators and IT security managers will find this book an essential practical resource.

Secure Integrated Circuits and Systems (Hardcover, 2010 ed.): Ingrid M.R. Verbauwhede Secure Integrated Circuits and Systems (Hardcover, 2010 ed.)
Ingrid M.R. Verbauwhede
R2,786 Discovery Miles 27 860 Ships in 18 - 22 working days

On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits.

Biometrics, Computer Security Systems and Artificial Intelligence Applications (Hardcover, 2006 ed.): Khalid Saeed, Jerzy... Biometrics, Computer Security Systems and Artificial Intelligence Applications (Hardcover, 2006 ed.)
Khalid Saeed, Jerzy Pejas, Romuald Mosdorf
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

This book presents the most recent achievements in some rapidly developing fields within Computer Science. This includes the very latest research in biometrics and computer security systems, and descriptions of the latest inroads in artificial intelligence applications. The book contains over 30 articles by well-known scientists and engineers. The articles are extended versions of works introduced at the ACS-CISIM 2005 conference.

The Future of Open Data (Hardcover): Pamela Robinson, Teresa Scassa The Future of Open Data (Hardcover)
Pamela Robinson, Teresa Scassa
R1,234 Discovery Miles 12 340 Ships in 10 - 15 working days

The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Grant project that set out to explore open government geospatial data from an interdisciplinary perspective. Researchers on the grant adopted a critical social science perspective grounded in the imperative that the research should be relevant to government and civil society partners in the field. This book builds on the knowledge developed during the course of the grant and asks the question, "What is the future of open data?" The contributors' insights into the future of open data combine observations from five years of research about the Canadian open data community with a critical perspective on what could and should happen as open data efforts evolve. Each of the chapters in this book addresses different issues and each is grounded in distinct disciplinary or interdisciplinary perspectives. The opening chapter reflects on the origins of open data in Canada and how it has progressed to the present date, taking into account how the Indigenous data sovereignty movement intersects with open data. A series of chapters address some of the pitfalls and opportunities of open data and consider how the changing data context may impact sources of open data, limits on open data, and even liability for open data. Another group of chapters considers new landscapes for open data, including open data in the global South, the data priorities of local governments, and the emerging context for rural open data.

Wireless Communications Security (Hardcover): Hideki Imai Wireless Communications Security (Hardcover)
Hideki Imai
R2,622 Discovery Miles 26 220 Ships in 18 - 22 working days

Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. The book provides expert guidance on how to evaluate cryptography deployment impact on current wireless network architectures and implement an effective cryptography architecture for any organization. This forward-looking resource offers the technical know-how practitioners need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks.

Architectures and Protocols for Secure Information Technology Infrastructures (Hardcover, New): Antonio Ruiz-Martinez, Rafael... Architectures and Protocols for Secure Information Technology Infrastructures (Hardcover, New)
Antonio Ruiz-Martinez, Rafael Marin-Lopez, Fernando Pereniguez Garcia
R4,971 Discovery Miles 49 710 Ships in 18 - 22 working days

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover): Fred Cohen IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover)
Fred Cohen
R4,071 Discovery Miles 40 710 Ships in 10 - 15 working days

The IT Security Governance Guidebook with Security Program Metrics provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying downloadable resources offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.

Secure Networked Inference with Unreliable Data Sources (Hardcover, 1st ed. 2018): Aditya Vempaty, Bhavya Kailkhura, Pramod K.... Secure Networked Inference with Unreliable Data Sources (Hardcover, 1st ed. 2018)
Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney
R2,662 Discovery Miles 26 620 Ships in 18 - 22 working days

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security,... Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (Hardcover, 2008 ed.)
Yucel Karabulut, John C. Mitchell, Peter Herrmann, Christian Damsgaard Jensen
R2,859 Discovery Miles 28 590 Ships in 18 - 22 working days

This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. IFIPTM 2008 is an open IFIP conference, which only accepts contributed pa pers, so all papers in these proceedings have passed strict peer review. The pro gram of the conference features both theoretical research papers and reports of real world case studies. IFIPTM 2008 received 62 submissions. The program commit tee selected 22 papers for presentation and inclusion in the proceedings. In addi tion, the program and the proceedings include 3 demo descriptions. The highlights of IFIPTM 2008 include invited talks and tutorials by industri al and academic experts in the fields of trust management, privacy and security, including Jon Bing and Michael Steiner.

Aggressive Network Self-Defense (Paperback): Neil Wyler Aggressive Network Self-Defense (Paperback)
Neil Wyler
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.
*First book to demonstrate and explore controversial network strike back and countermeasure techniques.
*Provides tightly guarded secrets to find out WHO is really attacking you over the internet.
*Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.

Confident Cyber Security - The Essential Insights and How to Protect from Threats (Hardcover, 2nd Revised edition): Jessica... Confident Cyber Security - The Essential Insights and How to Protect from Threats (Hardcover, 2nd Revised edition)
Jessica Barker
R1,448 R1,185 Discovery Miles 11 850 Save R263 (18%) Ships in 18 - 22 working days

The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident Cyber Security is here to help. From the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies including Disney, the NHS, Taylor Swift and Frank Abagnale, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. This new edition covers increasingly important topics such as deepfakes, AI and blockchain technology. About the Confident series... From coding and data science to cloud and cyber security, the Confident books are perfect for building your technical knowledge and enhancing your professional career.

Trusted Cloud Computing (Hardcover, 2014 ed.): Helmut Krcmar, Ralf Reussner, Bernhard Rumpe Trusted Cloud Computing (Hardcover, 2014 ed.)
Helmut Krcmar, Ralf Reussner, Bernhard Rumpe
R3,754 R2,002 Discovery Miles 20 020 Save R1,752 (47%) Ships in 10 - 15 working days

This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework. In this domain, business models, legislative circumstances, technical possibilities, and realizable security are closely interwoven and thus are addressed jointly. The book is organized in four parts on "Security and Privacy", "Software Engineering and Software Quality", "Platforms, Middleware and Integration", and "Social Aspects, Business Models and Standards". It thus provides a holistic view on technological, societal, and legal aspects, which are indispensable not only to ensure the security of cloud services and the data they process, but also to gain the trust of society, business, industry, and science in these services. The ultimate goal of the book, as well as of the Trusted Cloud Program in general, is to distribute these results to a broader audience in both academia and industry, and thus to help with the proliferation of "Industry 4.0" services.

Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.): Steve G. Watkins Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.)
Steve G. Watkins
R444 Discovery Miles 4 440 Ships in 18 - 22 working days

ISO/IEC 27001:2022 - An introduction to information security and the ISMS standardThe perfect introduction to the principles of information security management and ISO 27001:2022An ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security, this pocket guide will ensure the ISMS (information security management system) you put in place is effective, reliable and auditable. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. This must-have resource gives a clear, concise and easy-to-read introduction to information security, providing guidance to ensure the management systems you put in place are effective, reliable and auditable. This pocket guide will help you to: Make informed decisions - Enables key employees to make better decisions before embarking on an information security project. Ensure everyone is up to speed - Gives the non-specialists on the project board and in the project team a clearer understanding of what an ISMS involves, reflecting ISO 27001:2022. Raise awareness among staff - Ensures that your staff know what is at stake with regard to information security and understand what is expected of them. Enhance your competitiveness - Gives you confidence to begin your ISO 27001:2022 implementation journey and let your customers know that the information you hold about them is managed and protected appropriately. Get up to speed with the ISO 27001:2022 updates and keep your information secure

Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Paperback): Douglas J Landoll Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Paperback)
Douglas J Landoll
R1,083 Discovery Miles 10 830 Ships in 9 - 17 working days

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

Model-Driven Risk Analysis - The CORAS Approach (Hardcover, 2011 ed.): Mass Soldal Lund, Bjornar Solhaug, Ketil Stolen Model-Driven Risk Analysis - The CORAS Approach (Hardcover, 2011 ed.)
Mass Soldal Lund, Bjornar Solhaug, Ketil Stolen
R1,499 Discovery Miles 14 990 Ships in 18 - 22 working days

The term risk is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors' aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.

Security in Autonomous Driving (Hardcover): Obaid Ur-Rehman, Natasa Zivic Security in Autonomous Driving (Hardcover)
Obaid Ur-Rehman, Natasa Zivic
R3,859 Discovery Miles 38 590 Ships in 10 - 15 working days

Autonomous driving is an emerging field. Vehicles are equipped with different systems such as radar, lidar, GPS etc. that enable the vehicle to make decisions and navigate without user's input, but there are still concerns regarding safety and security. This book analyses the security needs and solutions which are beneficial to autonomous driving.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
60 Days to LinkedIn Mastery - The…
Josh Steimle Hardcover R657 Discovery Miles 6 570
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,193 R1,119 Discovery Miles 11 190
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Digital Libraries - Integrating Content…
Mark V Dahl, Kyle Banerjee, … Paperback R1,150 Discovery Miles 11 500
Social Media Marketing for Small…
Mark Warner Hardcover R711 Discovery Miles 7 110
Twitter - How To Market & Make Money…
Ace McCloud Hardcover R523 R487 Discovery Miles 4 870
The Hitchhiker's Guide To AI - A…
Arthur Goldstuck Paperback R505 Discovery Miles 5 050
Ready, Set, Growth hack - A beginners…
Nader Sabry Hardcover R676 R605 Discovery Miles 6 050
Pacific Service Magazine; v.11 (June…
Pacific Gas and Electric Company Hardcover R1,016 Discovery Miles 10 160
Lives of the Most Eminent Painters…
Giorgio Vasari Paperback R675 Discovery Miles 6 750

 

Partners