![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Network security
The book presents selected papers from the 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 14th International Conference on Frontiers of Information Technology, Applications and Tools, held on October 29 - 31, 2021, in Kaohsiung, Taiwan. It is divided into two volumes and discusses latest research outcomes in the field of information technology (IT) including but not limited to information hiding, multimedia signal processing, big data, data mining, bioinformatics, database, industrial and Internet of things, and their applications.
This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN network implements the "four principles" of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network.
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security.
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, India, during 4-5 September 2020. The book addresses the algorithmic aspect of machine intelligence which includes the framework and optimization of various states of algorithms. Variety of papers related to wide applications in various fields like data-driven industrial IoT, bioinformatics, network and security, autonomous computing and various other aligned areas. The book concludes with interdisciplinary applications like legal, health care, smart society, cyber-physical system and smart agriculture. All papers have been carefully reviewed. The book is of interest to computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.
This book includes the original, peer-reviewed research articles from the International Conference on Computational Intelligence and Computing (ICCIC 2020), held in September 2020 on a virtual platform jointly organized by SR Group of Institutions, Jhansi, India, IETE, Kolkata Centre, India, and Eureka Scientech Research Foundation, Kolkata India. It covers the latest research in image processing, computer vision and pattern recognition, machine learning, data mining, big data and analytics, information security and privacy, wireless and sensor networks and IoT applications, artificial intelligence, expert systems, natural language processing, image processing, computer vision, artificial neural networks, fuzzy logic, evolutionary optimization, rough sets, web intelligence, intelligent agent technology, virtual reality, and visualization.
Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email detector, or just interested in finding patterns in your datasets? This book can let you do it on your own. Numerous examples and datasets links are included so that the reader can "learn by doing." Anyone with a basic college-level calculus course and some probability knowledge can easily understand most of the material. The book includes chapters containing: unsupervised learning, semi-supervised learning, supervised learning, text mining, natural language processing, and more. It also includes background on security, statistics, and linear algebra. The website for the book contains a listing of datasets, updates, and other resources for serious practitioners.
The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives, in-depth explanations of each topic, and accurate practice questions. Each chapter includes exam tips that highlight key exam information, hands-on exercises, a summary that serves as a quick review, and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference. Richard E. Cascarino, MBA, CIA, CISM, CFE, CRMA, is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years' experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA, and the Association of Certified Fraud Examiners, where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office, Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand, author of the book Internal Auditing: An Integrated Approach, now in its third edition. This book is extensively used as a university textbook worldwide. In addition, he is the author of the Auditor's Guide to IT Auditing, Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE, the Ultimate Resource.
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.
Ensure the success of your security programme by understanding users' motivations"This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronising or prescriptive, making it an easy read with some very real practical takeaways."Thom Langford, Chief Information Security Officer at Publicis Groupe"Based on real world examples the book provides valuable insights into the relationship of information security, compliance, business economics and decision theory. Drawing on interdisciplinary studies, commentary from the field and his own research Leron gives the reader the necessary background and practical tools to drive improvements in their own information security program."Daniel Schatz, Director for Threat & Vulnerability Management at Thomson Reuters In today's corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their company's assets and mitigate risks to the furthest extent possible.Security professionals can often be ignorant of the impact that implementing security policies in a vacuum can have on the end users' core business activities. These end users are, in turn, often unaware of the risk they are exposing the organisation to. They may even feel justified in finding workarounds because they believe that the organisation values productivity over security. The end result is a conflict between the security team and the rest of the business, and increased, rather than reduced, risk.This can be addressed by factoring in an individual's perspective, knowledge and awareness, and a modern, flexible and adaptable information security approach. The aim of the security practice should be to correct employee misconceptions by understanding their motivations and working with the users rather than against them - after all, people are a company's best assets.Product descriptionBased on insights gained from academic research as well as interviews with UK-based security professionals from various sectors, The Psychology of Information Security - Resolving conflicts between security compliance and human behaviour explains the importance of careful risk management and how to align a security programme with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.The Psychology of Information Security redresses the balance by considering information security from both viewpoints in order to gain insight into security issues relating to human behaviour , helping security professionals understand how a security culture that puts risk into context promotes compliance. About the authorLeron Zinatullin (zinatullin.com) is an experienced risk consultant specialising in cyber security strategy, management and delivery. He has led large-scale, global, high-value security transformation projects with a view to improve cost performance and support business strategy.He has extensive knowledge and practical experience in solving information security, privacy and architectural issues across multiple industry sectors.He has an MSc in information security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behaviour.Series informationThe Psychology of Information Security is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.Ensure the success of your security programmes by understanding the psychology of information security. Buy this book today.
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense. This book also presents the latest fundamental research results toward understanding proactive and dynamic network defense by top researchers in related areas. It includes research results that offer formal frameworks to define proactive and dynamic network defense, and develop novel models to analyze and evaluate proactive designs and strategies in computer systems, network systems, cyber-physical systems and wireless networks. A wide variety of scientific techniques have been highlighted to study these problems in the fundamental domain. As the convergence of our physical and digital worlds grows fast pace, protecting information systems from being tampered or unauthorized access is becoming one of the most importance issues. The traditional mechanisms of network defense are built upon a static, passive, and reactive nature, which has insufficient to defend against today's attackers that attempt to persistently analyze, probe, circumvent or fool such mechanisms. It has not yet been fully investigated to address the early stage of "cyber kill chain" when adversaries carry out sophisticated reconnaissance to plan attacks against a defense system. Recently, proactive and dynamic network defense has been proposed as an important alternative towards comprehensive network defense. Two representative types of such defense are moving target defense (MTD) and deception-based techniques. These emerging approaches show great promise to proactively disrupt the cyber-attack kill chain and are increasingly gaining interest within both academia and industry. However, these approaches are still in their preliminary design stage. Despite the promising potential, there are research issues yet to be solved regarding the effectiveness, efficiency, costs and usability of such approaches. In addition, it is also necessary to identify future research directions and challenges, which is an essential step towards fully embracing proactive and dynamic network defense. This book will serve as a great introduction for advanced-level computer science and engineering students who would like to start R&D efforts in the field of proactive and dynamic network defense. Researchers and professionals who work in this related field will also find this book useful as a reference.
This book describes the evolving CBRN risk landscape and highlights advances in the "core" CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks, challenging certain assumptions that underlie current control regimes. The book also shows how technologies can be enablers for more effective strategies to mitigate these risks. 21st-century safety and security risks emanating from chemical, biological, radiological and nuclear materials - whether resulting from natural events, accidents or malevolent use - are increasingly shaped by technologies that enable their development, production or use in ways that differ from the past. Artificial intelligence, the use of cyberspace, the revolution in the life sciences, new manufacturing methods, new platforms and equipment for agent delivery, hypersonic weapons systems, information tools utilised in hybrid warfare - these and other technologies are reshaping the global security environment and CBRN landscape. They are leading to a growing potential for highly targeted violence, and they can lead to greater instability and vulnerability worldwide. At the same time, technology offers solutions to manage CBRN risks. Examples are faster detection, more accurate characterisation of the nature and origin of CBRN agents, new forensic investigation methods, or new medical treatments for victims of CBRN incidents. New educational concepts help to foster a culture of responsibility in science and technology and strengthen governance. New training methods help develop practical skills to manage CBRN risks more effectively. The book concludes that there is a growing need for a holistic framework towards CBRN risk mitigation. Traditional arms control mechanisms such as global, regional or bilateral treaties and export controls are still needed, as they provide a necessary legal and institutional framework. But laws and technology denial alone will not suffice, and institutional mechanisms can at times be weak. Given the pace of technological progress and the diffusion of critical knowledge, tools and materials, policymakers must accept that CBRN risks cannot be eliminated altogether. Instead, society has to learn to manage these risks and develop resilience against them. This requires a "softer", broadly based multi-stakeholder approach involving governments, industry, the research and development communities, educators, and civil society. Furthermore, educating policymakers that cutting-edge technologies may seriously affect global strategic stability could create incentives for developing a more creative and contemporary arms control strategy that fosters cooperation rather than incremental polarisation.
This edited book provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness. The book presents original unpublished research papers on blockchain technology and business management on novel architectures, prototypes and case studies.
This book discusses understand cybersecurity management in decentralized finance (DeFi). It commences with introducing fundamentals of DeFi and cybersecurity to readers. It emphasizes on the importance of cybersecurity for decentralized finance by illustrating recent cyber breaches, attacks, and financial losses. The book delves into understanding cyber threats and adversaries who can exploit those threats. It advances with cybersecurity threat, vulnerability, and risk management in DeFi. The book helps readers understand cyber threat landscape comprising different threat categories for that can exploit different types of vulnerabilities identified in DeFi. It puts forward prominent threat modelling strategies by focusing on attackers, assets, and software. The book includes the popular blockchains that support DeFi include Ethereum, Binance Smart Chain, Solana, Cardano, Avalanche, Polygon, among others. With so much monetary value associated with all these technologies, the perpetrators are always lured to breach security by exploiting the vulnerabilities that exist in these technologies. For simplicity and clarity, all vulnerabilities are classified into different categories: arithmetic bugs, re-Entrancy attack, race conditions, exception handling, using a weak random generator, timestamp dependency, transaction-ordering dependence and front running, vulnerable libraries, wrong initial assumptions, denial of service, flash loan attacks, and vampire Since decentralized finance infrastructures are the worst affected by cyber-attacks, it is imperative to understand various security issues in different components of DeFi infrastructures and proposes measures to secure all components of DeFi infrastructures. It brings the detailed cybersecurity policies and strategies that can be used to secure financial institutions. Finally, the book provides recommendations to secure DeFi infrastructures from cyber-attacks.
This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.
This book constitutes the refereed proceedings of the 14th IFIP WG 11.8 World Conference on Information Security Education, WISE 14, held virtually in June 2021. The 8 papers presented together with a special chapter showcasing the history of WISE and two workshop papers were carefully reviewed and selected from 19 submissions. The papers are organized in the following topical sections: a roadmap for building resilience; innovation in curricula; teaching methods and tools; and end-user security.
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide As cybersecurity becomes an increasingly mission-critical issue, more and more employers and professionals are turning to ISACA's trusted and recognized Certified Information Security Manager qualification as a tried-and-true indicator of information security management expertise. In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further. Sharpen your skills with Exam Essentials and chapter review questions with detailed explanations in all four of the CISM exam domains: Information Security Governance, Information Security Risk Management, Information Security Program, and Incident Management. In this essential resource, you'll also: Grab a head start to an in-demand certification used across the information security industry Expand your career opportunities to include rewarding and challenging new roles only accessible to those with a CISM credential Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone prepping for the challenging CISM exam or looking for a new role in the information security field, the Certified Information Security Manager (CISM) Study Guide is an indispensable resource that will put you on the fast track to success on the test and in your next job.
Large data sets arriving at every increasing speeds require a new set of efficient data analysis techniques. Data analytics are becoming an essential component for every organization and technologies such as health care, financial trading, Internet of Things, Smart Cities or Cyber Physical Systems. However, these diverse application domains give rise to new research challenges. In this context, the book provides a broad picture on the concepts, techniques, applications, and open research directions in this area. In addition, it serves as a single source of reference for acquiring the knowledge on emerging Big Data Analytics technologies.
Provides 100% coverage of every objective on the 2022 CISM exam This integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by an expert in the field, the book offers exam-focused coverage of information security governance, information risk management, information security program development and management, and information security incident management. CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition features learning objectives, exam tips, practice questions, and in-depth explanations. All questions closely match those on the live test in tone, format, and content. Special design elements throughout provide real-world insight and call out potentially harmful situations. Beyond fully preparing you for the exam, the book also serves as a valuable on-the-job reference. Features complete coverage of all 2022 CISM exam domains Online content includes 300 practice questions in the customizable TotalTester (TM) exam engine Written by a cybersecurity expert, author, and lecturer
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks. These security breaches include attacks on single computers, computer networks, wireless networks, databases, or authentication compromises. This book describes data warehousing and data mining techniques that can be used to detect attacks. It is designed to be a useful handbook for practitioners and researchers in industry, and is also suitable as a text for advanced-level students in computer science.
The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on how to address the current challenges in the field. As such it is a valuable reference resource for researchers and practitioners in academia and industry. |
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, …
Hardcover
R7,311
Discovery Miles 73 110
|