0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (589)
  • R500+ (5,153)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition)
Nick Catrantzos
R3,852 R3,296 Discovery Miles 32 960 Save R556 (14%) Ships in 9 - 17 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Cybercrime Risks and Responses - Eastern and Western Perspectives (Hardcover, 1st ed. 2015): Russell G. Smith, Ray Cheung,... Cybercrime Risks and Responses - Eastern and Western Perspectives (Hardcover, 1st ed. 2015)
Russell G. Smith, Ray Cheung, Laurie Yiu-Chung Lau
R2,792 R1,891 Discovery Miles 18 910 Save R901 (32%) Ships in 10 - 15 working days

This book examines the most recent and contentious issues in relation to cybercrime facing the world today, and how best to address them. The contributors show how Eastern and Western nations are responding to the challenges of cybercrime, and the latest trends and issues in cybercrime prevention and control.

Open Source Systems Security Certification (Hardcover, 1st Edition.
2nd Printing. 2008): Ernesto Damiani, Claudio Agostino... Open Source Systems Security Certification (Hardcover, 1st Edition. 2nd Printing. 2008)
Ernesto Damiani, Claudio Agostino Ardagna, Nabil El Ioini
R2,662 Discovery Miles 26 620 Ships in 18 - 22 working days

Open Source Systems Security Certification discusses Security Certification Standards and establishes the need to certify open source tools and applications. This includes the international standard for the certification of IT products (software, firmware and hardware) Common Criteria (ISO/IEC 15408) (CC 2006), a certification officially adopted by the governments of 18 nations.

Without security certification, open source tools and applications are neither secure nor trustworthy. Open Source Systems Security Certification addresses and analyzes the urgency of security certification for security-sensible markets, such as telecommunications, government and the military, through provided case studies.

This volume is designed for professionals and companies trying to implement an Open Source Systems (OSS) aware IT governance strategy, and SMEs looking to attract new markets traditionally held by proprietary products or to reduce costs. This book is also suitable for researchers and advanced-level students.

Managing A Network Vulnerability Assessment (Paperback, illustrated edition): Thomas R. Peltier, Justin Peltier, John A Blackley Managing A Network Vulnerability Assessment (Paperback, illustrated edition)
Thomas R. Peltier, Justin Peltier, John A Blackley
R2,607 Discovery Miles 26 070 Ships in 10 - 15 working days

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.

Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Handbook of Research on Challenges and Risks Involved in Deploying 6G and NextGen Networks (Hardcover): A M Viswa Bharathy,... Handbook of Research on Challenges and Risks Involved in Deploying 6G and NextGen Networks (Hardcover)
A M Viswa Bharathy, Basim Alhadidi
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

There is a need to be aware of the challenges awaiting us in next generation (NextGen) networks in order to take the proper steps to either minimize or eliminate issues as they present themselves. Incorporating artificial intelligence in NextGen networks for privacy and security policies will serve this purpose. It is essential to stay current with these emerging technologies and applications in order to maintain safe and secure communications in the future. The Handbook of Research on Challenges and Risks Involved in Deploying 6G and NextGen Networks explores strategies for the design and deployment of more secured and user-centered NextGen networks through artificial intelligence to enrich user experience. It further investigates the political, social, and geographical challenges involved in realizing these 6G networks and explores ways to improve the security of future potential applications as well as protect user data from illegal access. Covering topics such as deep learning algorithms, aerial network communication, and edge computing, this major reference work is an indispensable resource for regulatory and policy groups, associations and technology groups, government and international bodies, technology executives and technical institutions, management consulting and advisory firms, communication engineers, network engineers, students and educators of higher education, researchers, and academicians.

Information Security Risk Assessment Toolkit - Practical Assessments through Data Collection and Data Analysis (Paperback):... Information Security Risk Assessment Toolkit - Practical Assessments through Data Collection and Data Analysis (Paperback)
Mark Talabis, Jason Martin
R1,044 R866 Discovery Miles 8 660 Save R178 (17%) Ships in 10 - 15 working days

In order to protect company s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored."Information Security Risk Assessments" gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

Based on authors experiences of real-world assessments, reports, and presentations
Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment"

Hop Integrity in the Internet (Hardcover, 2006 ed.): Chin-tser Huang, Mohamed G Gouda Hop Integrity in the Internet (Hardcover, 2006 ed.)
Chin-tser Huang, Mohamed G Gouda
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. If a message that is part of a denial-of-service attack is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet.

A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in the suite is specified and verified using an abstract and formal notation called the Secure Protocol Notation. The protocols include:

- Secure address resolution

- Weak hop integrity

- Strong hop integrity using soft sequence numbers

- Strong hop integrity using hard sequence numbers

Other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast.

Ethical Digital Technology in Practice (Paperback): Simon Rogerson Ethical Digital Technology in Practice (Paperback)
Simon Rogerson
R1,637 Discovery Miles 16 370 Ships in 9 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience... The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) (Hardcover)
Alan Calder
R1,621 Discovery Miles 16 210 Ships in 18 - 22 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback): K Crawley 8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback)
K Crawley
R644 R564 Discovery Miles 5 640 Save R80 (12%) Ships in 9 - 17 working days

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Detecting Peripheral-based Attacks on the Host Memory (Hardcover, 2015 ed.): Patrick Stewin Detecting Peripheral-based Attacks on the Host Memory (Hardcover, 2015 ed.)
Patrick Stewin
R2,636 Discovery Miles 26 360 Ships in 18 - 22 working days

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.

Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Hardcover, 2014 ed.): Aboul Ella Hassanien, Tai-Hoon... Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations (Hardcover, 2014 ed.)
Aboul Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad
R4,117 Discovery Miles 41 170 Ships in 18 - 22 working days

This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility."

Multimedia Encryption and Watermarking (Hardcover, 2005 ed.): Borko Furht, Edin Muharemagic, Daniel Socek Multimedia Encryption and Watermarking (Hardcover, 2005 ed.)
Borko Furht, Edin Muharemagic, Daniel Socek
R4,195 Discovery Miles 41 950 Ships in 18 - 22 working days

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property.

Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio sharing techniques. Part III, Digital Watermarking, introduces the concept of watermarking for multimedia, classifies watermarking applications, and evaluates various multimedia watermarking concepts and techniques, including digital watermarking techniques for binary images.

Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia content. This volume is also suitable as a textbook for graduate courses on multimedia security.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated edition)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R3,084 Discovery Miles 30 840 Ships in 10 - 15 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.

The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Host Integrity Monitoring Using Osiris and Samhain (Paperback): Brian Wotring Host Integrity Monitoring Using Osiris and Samhain (Paperback)
Brian Wotring
R1,404 Discovery Miles 14 040 Ships in 10 - 15 working days

This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments.

Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy.
* Brian Wotring is the creator of Osiris. He speaks and writes frequently on Osiris for major magazines, Web sites, and trade shows. And, the book can be prominently marketed from the Osiris Web site
* This is the first book published on host integrity monitoring, despite the widespread deployment of
Osiris and Samhain
* Host Integrity Monitoring is the only way to accurately determine if a malicious attacker has successfully compromised the security measures of your network

New Technologies and National Security Challenges (Hardcover): Neil Kent, Irina du Quenoy New Technologies and National Security Challenges (Hardcover)
Neil Kent, Irina du Quenoy
R4,670 Discovery Miles 46 700 Ships in 18 - 22 working days

The pioneering essays in this volume explore national security challenges posed by new technologies and examine some ongoing efforts to understand and mitigate their potential negative effects. The authors, drawn from among a roster of international scholars, approach these issues from different yet ultimately complementary angles. Turkish scholar Emin Daskin chronicles the efforts of the Turkish government to develop and implement a Cyber Security Strategy aimed at protecting the country from attacks by both governmental and non-governmental cyber actors. French researcher Christine Dugoin-Clement has studied what she views as a successful case of cyberwarfare, in which Ukrainian soldiers fighting in the eastern separatist region of Donbass have been targeted by cyber attackers attempting to deteriorate their cognition, rendering them less effective in the field. Another French author and military academy instructor, Thomas Flichy de La Neuville, provides a counterpoint study of militarized motorbike attacks in the Sahel, demonstrating that cyberspace is not the only technological sphere in which innovation increasingly threatens security. Finally, American academic Christopher Whyte offers a trenchant critique of current academic studies of cyberterrorism, noting that while "cyberterrorism" appears frequently as a subject of research, the actual work being carried out in this critical area lacks thematic nuance and is only tenuously linked to related major thematic topic areas. The collection highlights the unique challenges faced by countries as they attempt to deal with previously unknown adversaries, as both the nature of the enemy and the field of operations continues to shift with unprecedented speed. It will undoubtedly be of interest to anyone concerned with international relations, cybersecurity, cyberterrorism, and national security in the twenty-first century.

Building an Information Security Awareness Program (Paperback): Mark B. Desman Building an Information Security Awareness Program (Paperback)
Mark B. Desman
R3,080 Discovery Miles 30 800 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions.
Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

The Economics of Financial and Medical Identity Theft (Hardcover, 2012): L. Jean Camp, M. Eric Johnson The Economics of Financial and Medical Identity Theft (Hardcover, 2012)
L. Jean Camp, M. Eric Johnson
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear.

The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book.

The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.

Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.): Salvatore J Stolfo, Steven M. Bellovin, Shlomo... Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Securing IM and P2P Applications for the Enterprise (Paperback): Marcus Sachs, Paul Piccard Securing IM and P2P Applications for the Enterprise (Paperback)
Marcus Sachs, Paul Piccard
R1,363 Discovery Miles 13 630 Ships in 10 - 15 working days

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications.
These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.
* A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004
* The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time
* The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics

Collaborative Computer Security and Trust Management (Hardcover): Collaborative Computer Security and Trust Management (Hardcover)
R4,567 Discovery Miles 45 670 Ships in 18 - 22 working days

As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful security threats. Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covering topics such as trust-based security, threat and risk analysis, and data sharing, this reference book provides a complete collection of the latest field developments.

Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention (Hardcover): Nabie Y. Conteh Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention (Hardcover)
Nabie Y. Conteh
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent cybercrime and contribute new countermeasures towards protecting computers, servers, networks, web applications, mobile devices, and stored data from black hat attackers who have malicious intent, as well as to stop against unauthorized access instead of using hacking in the traditional sense to launch attacks on these devices, can contribute emerging and advanced solutions against cybercrime. Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention is a comprehensive text that discusses and defines ethical hacking, including the skills and concept of ethical hacking, and studies the countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft, and computer-related crimes. It broadens the understanding of cybersecurity by providing the necessary tools and skills to combat cybercrime. Some specific topics include top cyber investigation trends, data security of consumer devices, phases of hacking attacks, and stenography for secure image transmission. This book is relevant for ethical hackers, cybersecurity analysts, computer forensic experts, government officials, practitioners, researchers, academicians, and students interested in the latest techniques for preventing and combatting cybercrime.

Security in Smart Home Networks (Hardcover, 1st ed. 2023): Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen Security in Smart Home Networks (Hardcover, 1st ed. 2023)
Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen
R3,304 Discovery Miles 33 040 Ships in 18 - 22 working days

This book presents the security and privacy challenges of the smart home following the logic of "terminal device - voice interface - application platform". For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,311 Discovery Miles 33 110 Ships in 10 - 15 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.): Konstantinos Markantonakis, Keith Mayes Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.)
Konstantinos Markantonakis, Keith Mayes
R5,927 Discovery Miles 59 270 Ships in 18 - 22 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R947 R826 Discovery Miles 8 260
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Malware Diffusion Models for Modern…
Vasileios Karyotis, M. H. R. Khouzani Paperback R2,293 R2,171 Discovery Miles 21 710
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610

 

Partners