0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (210)
  • R250 - R500 (607)
  • R500+ (5,105)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Reversible Steganography and Authentication via Transform Encoding (Hardcover, 1st ed. 2020): Jyotsna Kumar Mandal Reversible Steganography and Authentication via Transform Encoding (Hardcover, 1st ed. 2020)
Jyotsna Kumar Mandal
R4,279 Discovery Miles 42 790 Ships in 18 - 22 working days

This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain. Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganographic processes, the book also explores the adjustment of pixel values after embedding and presents numerical examples of reversible computations. In the context of chaos-based authentication, it also describes testing the quality of generator is using Monobit, Serial and Poker tests. The book then outlines 15 test cases recommended by NIST fifteen test cases, along with their implementation on six evolutionary algorithms for neural cryptographic systems in the context of wireless computations - TPM, KSOMSCT, DHLPSCT, CHDLPSCT, CTHLPSCT and CGTHLPSCT - and verifies their satisfiability based on the implementations of these six techniques. Lastly it presents various metrics of image processing systems. This book is a valuable reference resource for research scholars, PG/UG students and practicing engineers

Investigating Windows Systems (Paperback): Harlan Carvey Investigating Windows Systems (Paperback)
Harlan Carvey
R1,450 Discovery Miles 14 500 Ships in 10 - 15 working days

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.

Information Assurance and Security Technologies for Risk Assessment and Threat Management - Advances (Hardcover): Te-Shun Chou Information Assurance and Security Technologies for Risk Assessment and Threat Management - Advances (Hardcover)
Te-Shun Chou
R4,948 Discovery Miles 49 480 Ships in 18 - 22 working days

The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information assurance and security, as well as explores emerging applications. The book aims to provides the readers with an opportunity to build a strong, fundamental understanding of theory and methods and, thus, to find solutions for many of today s most interesting and challenging problems regarding information assurance and security.

Principles of Secure Network Systems Design (Hardcover, 2002 ed.): H. Lawson Principles of Secure Network Systems Design (Hardcover, 2002 ed.)
H. Lawson; Sumit Ghosh
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This new book establishes a comprehensive framework for network security design, unifying the many concepts and aspects of network security and enabling all users to employ a common security foundation. It is presented from the perspective of fundamental principles underlying networking, network control algorithms and security. Using an accessible style and careful explanations, the principles and methodology address design concepts for current and future security concerns for networks. "Principles of Secure Network Systems Design" presents the topic in three basic parts. Part one covers the basic background of network security and the current scope for security in all types of networks and organizations. Part two focuses on the essential nature of network security and a scientific methodology for secure network design. Lastly, part three discusses concrete applications of the design concepts with real world networks, using three comprehensive case studies oriented around ATM networks. Topics and Features: * Holistic view of network security design, going beyond cryptographic issues * Comprehensive framework for a scientific basis of network security design * Integrated view of network security with networks¿ operational and management processes * Extensive case study through modeling & large-scale distributed simulation of ATM network * New approach to both security attack detection and strengthening networks against security attacks and vulnerabilities The book is an essential and practical resource for all professionals, policy makers, practitioners, and advanced students in networking, information systems, computer engineering & science, communications engineering, network design, and security consultants seeking a comprehensive framework for secure network systems design. It is also suitable for self-study purposes by professionals, as well as for advanced course use in network security.

Multimedia Security Using Chaotic Maps: Principles and Methodologies (Hardcover, 1st ed. 2020): Khalid M. Hosny Multimedia Security Using Chaotic Maps: Principles and Methodologies (Hardcover, 1st ed. 2020)
Khalid M. Hosny
R2,677 Discovery Miles 26 770 Ships in 18 - 22 working days

This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.

Network and Information Systems (Nis) Regulations - A Pocket Guide for Operators of Essential Services (Paperback): IT... Network and Information Systems (Nis) Regulations - A Pocket Guide for Operators of Essential Services (Paperback)
IT Governance
R391 Discovery Miles 3 910 Ships in 10 - 15 working days

This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them. An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law. This guide outlines the requirements for operators of essential services based on the Cyber Assessment Framework established by the National Cyber Security Centre (NCSC), including an explanation of the objectives, principles and indicators of good practice, and offers implementation guidance. This guide will help you: Understand how to comply with NIS Regulations, and avoid penalties associated with non-compliance Unravel the key definitions, authorities and points of contact Learn the benefits of a good Cyber Resilience plan Interpret and ensure compliance with the Cyber Assessment Framework Establish the NCSC's cyber security objectives, principles and indicators of good practice Your essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need.

Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor,... Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings (Hardcover, 1st ed. 2020)
Lynette Drevin, Sune Von Solms, Marianthi Theocharidou
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.

Security and Privacy - Select Proceedings of ICSP 2020 (Hardcover, 1st ed. 2021): Pantelimon Stanica, Sugata Gangopadhyay,... Security and Privacy - Select Proceedings of ICSP 2020 (Hardcover, 1st ed. 2021)
Pantelimon Stanica, Sugata Gangopadhyay, Sumit Kumar Debnath
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

Advances in Cybersecurity Management (Hardcover, 1st ed. 2021): Kevin Daimi, Cathryn Peoples Advances in Cybersecurity Management (Hardcover, 1st ed. 2021)
Kevin Daimi, Cathryn Peoples
R2,513 Discovery Miles 25 130 Ships in 18 - 22 working days

This book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information security management, government security policy, web penetration testing, security operations, and vulnerabilities management. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity management specialists and educators for keeping current their cybersecurity management knowledge. Further, they provide a glimpse of future directions where cybersecurity management techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity management experts in the listed fields and edited by prominent cybersecurity management researchers and specialists.

Multivariate Public Key Cryptosystems (Hardcover, 2nd ed. 2020): Jintai Ding, Albrecht Petzoldt, Dieter S Schmidt Multivariate Public Key Cryptosystems (Hardcover, 2nd ed. 2020)
Jintai Ding, Albrecht Petzoldt, Dieter S Schmidt
R4,262 Discovery Miles 42 620 Ships in 18 - 22 working days

This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key schemes, including the four multivariate signature schemes participating as second round candidates in the NIST standardization process for post-quantum cryptosystems. Furthermore, this book covers the Simple Matrix encryption scheme, which is currently the most promising multivariate public key encryption scheme. This book also covers the current state of security analysis methods for Multivariate Public Key Cryptosystems including the algorithms and theory of solving systems of multivariate polynomial equations over finite fields. Through the book's website, interested readers can find source code to the algorithms handled in this book. In 1994, Dr. Peter Shor from Bell Laboratories proposed a quantum algorithm solving the Integer Factorization and the Discrete Logarithm problem in polynomial time, thus making all of the currently used public key cryptosystems, such as RSA and ECC insecure. Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge. One of the most promising candidates for this are Multivariate Public Key Cryptosystems (MPKCs). The public key of an MPKC is a set of multivariate polynomials over a small finite field. Especially for digital signatures, numerous well-studied multivariate schemes offering very short signatures and high efficiency exist. The fact that these schemes work over small finite fields, makes them suitable not only for interconnected computer systems, but also for small devices with limited resources, which are used in ubiquitous computing. This book gives a systematic introduction into the field of Multivariate Public Key Cryptosystems (MPKC), and presents the most promising multivariate schemes for digital signatures and encryption. Although, this book was written more from a computational perspective, the authors try to provide the necessary mathematical background. Therefore, this book is suitable for a broad audience. This would include researchers working in either computer science or mathematics interested in this exciting new field, or as a secondary textbook for a course in MPKC suitable for beginning graduate students in mathematics or computer science. Information security experts in industry, computer scientists and mathematicians would also find this book valuable as a guide for understanding the basic mathematical structures necessary to implement multivariate cryptosystems for practical applications.

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Hardcover, 1st ed. 2021): Matthew Ryan Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Hardcover, 1st ed. 2021)
Matthew Ryan
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

Information Technology Risk Management and Compliance in Modern Organizations (Hardcover): Manish Gupta, Raj Sharman, John... Information Technology Risk Management and Compliance in Modern Organizations (Hardcover)
Manish Gupta, Raj Sharman, John Walp, Pavankumar Mulgund
R5,547 Discovery Miles 55 470 Ships in 18 - 22 working days

Attacks on information systems and applications have become more prevalent with new advances in technology. Management of security and quick threat identification have become imperative aspects of technological applications. Information Technology Risk Management and Compliance in Modern Organizations is a pivotal reference source featuring the latest scholarly research on the need for an effective chain of information management and clear principles of information technology governance. Including extensive coverage on a broad range of topics such as compliance programs, data leak prevention, and security architecture, this book is ideally designed for IT professionals, scholars, researchers, and academicians seeking current research on risk management and compliance.

Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,329 Discovery Miles 103 290 Ships in 18 - 22 working days
PKI Implementation and Infrastructures (Hardcover): Julian Ashbourn PKI Implementation and Infrastructures (Hardcover)
Julian Ashbourn
R3,348 Discovery Miles 33 480 Ships in 10 - 15 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021): Mark Stamp, Mamoun Alazab, Andrii... Malware Analysis Using Artificial Intelligence and Deep Learning (Hardcover, 1st ed. 2021)
Mark Stamp, Mamoun Alazab, Andrii Shalaginov
R4,819 Discovery Miles 48 190 Ships in 18 - 22 working days

This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.

Lessons Learned: Critical Information Infrastructure Protection - How to Protect Critical Information Infrastructure... Lessons Learned: Critical Information Infrastructure Protection - How to Protect Critical Information Infrastructure (Paperback)
IT Governance
R862 Discovery Miles 8 620 Ships in 18 - 22 working days

Understand how to protect your critical information infrastructure (CII). Billions of people use the services of critical infrastructure providers, such as ambulances, hospitals, and electricity and transport networks. This number is increasing rapidly, yet there appears to be little protection for many of these services. IT solutions have allowed organisations to increase their efficiency in order to be competitive. However, do we even know or realise what happens when IT solutions are not working - when they simply don't function at all or not in the way we expect? This book aims to teach the IT framework from within, allowing you to reduce dependence on IT systems and put in place the necessary processes and procedures to help protect your CII. Lessons Learned: Critical Information Infrastructure Protection is aimed at people who organise the protection of critical infrastructure, such as chief executive officers, business managers, risk managers, IT managers, information security managers, business continuity managers and civil servants. Most of the principles and recommendations described are also valid in organisations that are not critical infrastructure service providers. The book covers the following: - Lesson 1: Define critical infrastructure services. - Lesson 2: Describe the critical infrastructure service and determine its service level. - Lesson 3: Define the providers of critical infrastructure services. - Lesson 4: Identify the critical activities, resources and responsible persons needed to provide the critical infrastructure service. - Lesson 5: Analyse and identify the interdependencies of services and their reliance upon power supplies. - Lesson 6: Visualise critical infrastructure data. - Lesson 7: Identify important information systems and assess their importance. - Lesson 8: Identify and analyse the interconnections and dependencies of information systems. - Lesson 9: Focus on more critical services and prioritise your activities. - Lesson 10: Identify threats and vulnerabilities. - Lesson 11: Assess the impact of service disruptions. - Lesson 12: Assess the risks associated with the service and information system. - Lesson 13: Implement the necessary security measures. - Lesson 14: Create a functioning organisation to protect CII. - Lesson 15: Follow regulations to improve the cyber resilience of critical infrastructure services. - Lesson 16: Assess the security level of your information systems yourself and ask external experts to assess them as well. - Lesson 17: Scan networks yourself and ask external experts to scan them as well to find the systems that shouldn't be connected to the Internet but still are. - Lesson 18: Prepare business continuity and disaster recovery plans and test them at reasonable intervals. - Lesson 19: Establish reliable relations and maintain them. - Lesson 20: Share information and be a part of networks where information is shared. - Lesson 21: Train people to make sure they are aware of cyber threats and know the correct behaviour. - Lesson 22: If the CII protection system does not work as planned or give the desired output, make improvements. - Lesson 23: Be prepared to provide critical infrastructure services without IT systems. If possible, reduce dependence on IT systems. If possible, during a crisis, provide critical services at reduced functionality and/or in reduced volumes. Author Toomas Viira is a highly motivated, experienced and results-orientated cyber security risk manager and IT auditor. He has more than 20 years' experience in the IT and cyber security sectors.

Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceeding of the IIH-MSP 2021 & FITAT 2021,... Advances in Intelligent Information Hiding and Multimedia Signal Processing - Proceeding of the IIH-MSP 2021 & FITAT 2021, Kaohsiung, Taiwan, Volume 1 (Hardcover, 1st ed. 2022)
Shu-Chuan Chu, Shi-Huang Chen, Zhenyu Meng, Keun Ho Ryu, George A. Tsihrintzis
R6,999 Discovery Miles 69 990 Ships in 18 - 22 working days

The book presents selected papers from the 17th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 14th International Conference on Frontiers of Information Technology, Applications and Tools, held on October 29 - 31, 2021, in Kaohsiung, Taiwan. It is divided into two volumes and discusses latest research outcomes in the field of information technology (IT) including but not limited to information hiding, multimedia signal processing, big data, data mining, bioinformatics, database, industrial and Internet of things, and their applications.

Co-governed Sovereignty Network - Legal Basis and Its Prototype & Applications  with MIN Architecture (Hardcover, 1st ed.... Co-governed Sovereignty Network - Legal Basis and Its Prototype & Applications with MIN Architecture (Hardcover, 1st ed. 2021)
Hui Li, Xin Yang
R1,547 Discovery Miles 15 470 Ships in 18 - 22 working days

This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture designed to implement co-governance at the technical level. Explaining network sovereignty and including rich illustrations and tables, the book helps readers new to the field grasp the evolution and necessity of cyberspace sovereignty, gain insights into network trends and develop a preliminary understanding of complex network technologies such as blockchain, security mechanisms and routing strategies. The MIN network implements the "four principles" of cyberspace adopted by most nations and people: respecting cyber sovereignty; maintaining peace and protection; promoting openness and cooperation; and building good order to provide network system security. There maybe three scales of application scenario for MIN, the big one is for UN of Cyberspace, the middle one is for Smart city, the small one is for enterprise group or organizations as private network, MIN-VPN. We have developed the product of MIN-VPN, you could find its message on the preface if care about the security of your network.

Network Security - Private Communication in a Public World (Hardcover, 3rd edition): Charlie Kaufman, Radia Perlman, Mike... Network Security - Private Communication in a Public World (Hardcover, 3rd edition)
Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner
R1,695 Discovery Miles 16 950 Ships in 18 - 22 working days

The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)

Data Governance and Compliance - Evolving to Our Current High Stakes Environment (Hardcover, 1st ed. 2021): Rupa Mahanti Data Governance and Compliance - Evolving to Our Current High Stakes Environment (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,375 Discovery Miles 23 750 Ships in 10 - 15 working days

This book sets the stage of the evolution of corporate governance, laws and regulations, other forms of governance, and the interaction between data governance and other corporate governance sub-disciplines. Given the continuously evolving and complex regulatory landscape and the growing number of laws and regulations, compliance is a widely discussed issue in the field of data. This book considers the cost of non-compliance bringing in examples from different industries of instances in which companies failed to comply with rules, regulations, and other legal obligations, and goes on to explain how data governance helps in avoiding such pitfalls. The first in a three-volume series on data governance, this book does not assume any prior or specialist knowledge in data governance and will be highly beneficial for IT, management and law students, academics, information management and business professionals, and researchers to enhance their knowledge and get guidance in managing their own data governance projects from a governance and compliance perspective.

Quantum Cryptography and the Future of Cyber Security (Hardcover): Nirbhay Kumar Chaubey, Bhavesh B. Prajapati Quantum Cryptography and the Future of Cyber Security (Hardcover)
Nirbhay Kumar Chaubey, Bhavesh B. Prajapati
R6,408 Discovery Miles 64 080 Ships in 18 - 22 working days

The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.

Sustainable Communication Networks and Application - Proceedings of ICSCN 2020 (Hardcover, 1st ed. 2021): P. Karuppusamy,... Sustainable Communication Networks and Application - Proceedings of ICSCN 2020 (Hardcover, 1st ed. 2021)
P. Karuppusamy, Isidoros Perikos, Fuqian Shi, Tu N. Nguyen
R5,282 Discovery Miles 52 820 Ships in 18 - 22 working days

This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.

Emerging Technologies in Data Mining and Information Security - Proceedings of IEMIS 2020, Volume 3 (Hardcover, 1st ed. 2021):... Emerging Technologies in Data Mining and Information Security - Proceedings of IEMIS 2020, Volume 3 (Hardcover, 1st ed. 2021)
Joao Manuel R.S. Tavares, Satyajit Chakrabarti, Abhishek Bhattacharya, Sujata Ghatak
R5,368 Discovery Miles 53 680 Ships in 18 - 22 working days

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security.

Troubleshooting Windows 2000 TCP/IP (Paperback): Syngress Troubleshooting Windows 2000 TCP/IP (Paperback)
Syngress
R1,404 Discovery Miles 14 040 Ships in 10 - 15 working days

TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "supposed" to work is not enough for today's network managers. In this book, readers will learn to prevent, detect, troubleshoot and correct TCP/IP network problems. By using products such as distributed sniffers, field metering tools and protocol analyses, network managers can learn a lot about what is going on in (or wrong in) an internetwork and be able to troubleshoot a live TPC/IP network. This book focuses specifically on identifying problem areas, including identifying and correcting protocol errors, DNS route problems, application faults and slow response times.
Syngress have sold over 700,000 Microsoft and Cisco certification guides in the last two years. Most of the administrators buying these will be interested in this book.

* TPC/IP is a very popular topic; readers will welcome a guide to troubleshooting and repairing problems
* Tackles monitoring the network using protocol analyses
* Teaches effective methods of baselining and trend analysis

Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Hardcover, 1st ed. 2021): Sabu M.... Advances in Computing and Network Communications - Proceedings of CoCoNet 2020, Volume 1 (Hardcover, 1st ed. 2021)
Sabu M. Thampi, Erol Gelenbe, Mohammed Atiquzzaman, Vipin Chaudhary, Kuan-Ching Li
R8,236 Discovery Miles 82 360 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Catalysis, Volume 62
Chunshan Song Hardcover R4,617 Discovery Miles 46 170
Handbook of Thermoset Plastics
Hanna Dodiuk Paperback R5,942 Discovery Miles 59 420
Trends in Packaging of Food, Beverages…
Neil Farmer Hardcover R4,039 Discovery Miles 40 390
Computational Methods for Process…
W. Fred Ramirez Hardcover R2,456 Discovery Miles 24 560
Advances in Catalysis, Volume 63
Chunshan Song Hardcover R4,617 Discovery Miles 46 170
Resonance - Long-Lived Waves
Leonard Dobrzynski, Housni Al-Wahsh, … Paperback R3,925 Discovery Miles 39 250
Nonequilibrium Thermodynamics…
Yasar Demirel, Vincent Gerbaud Paperback R6,619 R6,115 Discovery Miles 61 150
Food Sustainability and the Media…
Marta Antonelli, Pierangelo Isernia Paperback R2,936 Discovery Miles 29 360
Process Systems Engineering for…
Ravendra Singh, Zhihong Yuan Hardcover R5,513 R5,107 Discovery Miles 51 070
Adex Optimized Adaptive Controllers and…
Juan M. Martin-Sanchez, Jose Rodellar Hardcover R3,902 Discovery Miles 39 020

 

Partners