0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (191)
  • R250 - R500 (613)
  • R500+ (5,301)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.): Salvatore J Stolfo, Steven M. Bellovin, Shlomo... Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,888 Discovery Miles 28 880 Ships in 10 - 15 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Intelligence and Law Enforcement in the 21st Century (Hardcover): Eugene De Silva, Asanga Abeyagoonesekera Intelligence and Law Enforcement in the 21st Century (Hardcover)
Eugene De Silva, Asanga Abeyagoonesekera
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

Multidisciplinary research is steadily revolutionizing traditional education, scientific approaches, and activities related to security matters. Therefore, the knowledge generated through multidisciplinary research into the field of application of scientific inquiry could be utilized to protect critical and vital assets of a country. The field of security requires focus on the assessment and resolution of complex systems. Consequently, the dynamics of the intelligence field leads to the necessity of raising awareness and placing priority on improved ideas using scientific inquiry. Intelligence and Law Enforcement in the 21st Century provides personnel directly working in the fields of intelligence and law enforcement with an opportunity to deeply delve into to the challenges, choices, and complications in finding, applying, and presenting the gathered intelligence through various methods and then presenting them through available policies and procedures in the arena of law and order. The book also addresses how law enforcement is critically assessed in the 21st century when implementing the rule of law and order. Covering topics such as counterterrorism, cybersecurity, biological and chemical weapons, and scientific inquiry, this is an essential text for law enforcement, intelligence specialists, analysts, cybersecurity professionals, government officials, students, teachers, professors, practitioners, and researchers in fields that include terrorism and national security.

Cyber-Physical Threat Intelligence for Critical Infrastructures Security - A Guide to Integrated Cyber-Physical Protection of... Cyber-Physical Threat Intelligence for Critical Infrastructures Security - A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures (Hardcover)
John Soldatos, James Philpot, Gabriele Giunta
R2,485 R2,160 Discovery Miles 21 600 Save R325 (13%) Ships in 9 - 17 working days

Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.

PKI Implementation and Infrastructures (Paperback): Julian Ashbourn PKI Implementation and Infrastructures (Paperback)
Julian Ashbourn
R1,163 Discovery Miles 11 630 Ships in 9 - 17 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,517 Discovery Miles 35 170 Ships in 12 - 19 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2... Privacy and Identity Management. Between Data Protection and Security - 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16-20, 2021, Revised Selected Papers (Hardcover, 1st ed. 2022)
Michael Friedewald, Stephan Krenn, Ina Schiering, Stefan Schiffner
R2,637 Discovery Miles 26 370 Ships in 10 - 15 working days

This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

Adversarial Deep Learning in Cybersecurity - Attack Taxonomies, Defence Mechanisms, and Learning Theories (Hardcover, 1st ed.... Adversarial Deep Learning in Cybersecurity - Attack Taxonomies, Defence Mechanisms, and Learning Theories (Hardcover, 1st ed. 2023)
Aneesh Sreevallabh Chivukula, Xinghao Yang, Bo Liu, Wei Liu, Wanlei Zhou
R4,921 Discovery Miles 49 210 Ships in 12 - 19 working days

A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.

Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention (Hardcover): Nabie Y. Conteh Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention (Hardcover)
Nabie Y. Conteh
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent cybercrime and contribute new countermeasures towards protecting computers, servers, networks, web applications, mobile devices, and stored data from black hat attackers who have malicious intent, as well as to stop against unauthorized access instead of using hacking in the traditional sense to launch attacks on these devices, can contribute emerging and advanced solutions against cybercrime. Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention is a comprehensive text that discusses and defines ethical hacking, including the skills and concept of ethical hacking, and studies the countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft, and computer-related crimes. It broadens the understanding of cybersecurity by providing the necessary tools and skills to combat cybercrime. Some specific topics include top cyber investigation trends, data security of consumer devices, phases of hacking attacks, and stenography for secure image transmission. This book is relevant for ethical hackers, cybersecurity analysts, computer forensic experts, government officials, practitioners, researchers, academicians, and students interested in the latest techniques for preventing and combatting cybercrime.

Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.): Konstantinos Markantonakis, Keith Mayes Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.)
Konstantinos Markantonakis, Keith Mayes
R6,428 Discovery Miles 64 280 Ships in 10 - 15 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Artificial Intelligence for Cybersecurity (Hardcover, 1st ed. 2022): Mark Stamp, Corrado Aaron Visaggio, Francesco Mercaldo,... Artificial Intelligence for Cybersecurity (Hardcover, 1st ed. 2022)
Mark Stamp, Corrado Aaron Visaggio, Francesco Mercaldo, Fabio Di Troia
R4,257 Discovery Miles 42 570 Ships in 12 - 19 working days

This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.

Fuzzing for Software Security Testing and Quality Assurance (Hardcover, New): Ari Takanen, Jared D. Demott, Charles Miller Fuzzing for Software Security Testing and Quality Assurance (Hardcover, New)
Ari Takanen, Jared D. Demott, Charles Miller
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days

"Fuzzing for Software Security Testing and Quality Assurance" gives software developers a powerful new tool to build secure, high-quality software, and takes a weapon from the malicious hackers' arsenal. This practical resource helps developers think like a software cracker, so they can find and patch flaws in software before harmful viruses, worms, and Trojans can use these vulnerabilities to rampage systems. Traditional software programmers and testers learn how to make fuzzing a standard practice that integrates seamlessly with all development activities. The book progresses through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also covers those cases where commercial tools fall short and developers need to build their own custom fuzzing tools.

AI and Deep Learning in Biometric Security - Trends, Potential, and Challenges (Hardcover): Gaurav Jaswal, Vivek Kanhangad,... AI and Deep Learning in Biometric Security - Trends, Potential, and Challenges (Hardcover)
Gaurav Jaswal, Vivek Kanhangad, Raghavendra Ramachandra
R4,936 Discovery Miles 49 360 Ships in 12 - 19 working days

This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. This text highlights a showcase of cutting-edge research on the use of convolution neural networks, autoencoders, recurrent convolutional neural networks in face, hand, iris, gait, fingerprint, vein, and medical biometric traits. It also provides a step-by-step guide to understanding deep learning concepts for biometrics authentication approaches and presents an analysis of biometric images under various environmental conditions. This book is sure to catch the attention of scholars, researchers, practitioners, and technology aspirants who are willing to research in the field of AI and biometric security.

Archives and Records - Privacy, Personality Rights, and Access (Hardcover, 1st ed. 2023): Mikulas Ctvrtnik Archives and Records - Privacy, Personality Rights, and Access (Hardcover, 1st ed. 2023)
Mikulas Ctvrtnik
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

This open access book addresses the protection of privacy and personality rights in public records, records management, historical sources, and archives; and historical and current access to them in a broad international comparative perspective. Considering the question "can archiving pose a security risk to the protection of sensitive data and human rights?", it analyses data security and presents several significant cases of the misuse of sensitive personal data, such as census data or medical records. It examines archival inflation and the minimisation and reduction of data in public records and archives, including data anonymisation and pseudonymisation, and the risks of deanonymisation and reidentification of persons. The book looks at post-mortem privacy protection, the relationship of the right to know and the right to be forgotten and introduces a specific model of four categories of the right to be forgotten. In its conclusion, the book presents a set of recommendations for archives and records management.

The Web Application Hacker's Handbook: Finding and  Exploiting Security Flaws 2e (Paperback, 2nd Edition): D Stuttard The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2e (Paperback, 2nd Edition)
D Stuttard
R1,354 R1,111 Discovery Miles 11 110 Save R243 (18%) Ships in 12 - 19 working days

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. * Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition * Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more * Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

Malware Detection (Hardcover, 2007 ed.): Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang Malware Detection (Hardcover, 2007 ed.)
Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang
R8,465 Discovery Miles 84 650 Ships in 10 - 15 working days

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware. The book analyzes current trends in malware activity online, including botnets and malicious code for profit, and it proposes effective models for detection and prevention of attacks using. Furthermore, the book introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage.

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,445 R1,333 Discovery Miles 13 330 Save R112 (8%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Recent Innovations in Computing - Proceedings of ICRIC 2021, Volume 2 (Hardcover, 1st ed. 2022): Pradeep Kumar Singh, Yashwant... Recent Innovations in Computing - Proceedings of ICRIC 2021, Volume 2 (Hardcover, 1st ed. 2022)
Pradeep Kumar Singh, Yashwant Singh, Jitender Kumar Chhabra, Zoltan Illes, Chaman Verma
R6,510 Discovery Miles 65 100 Ships in 10 - 15 working days

This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing (ICRIC 2021), held on June 8-9, 2021 by Eoetvoes Lorand University (ELTE), Budapest, Hungary in association with many Universities; WSG Poland, Knowledge University, ERBIL. The book is divided into two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.

Mobile Computation with Functions (Hardcover, 2002 ed.): Zeliha Dilsun Kirli Mobile Computation with Functions (Hardcover, 2002 ed.)
Zeliha Dilsun Kirli
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

The advanced state of computer networking and telecommunications technology makes it possible to view computers as parts of a global computation platform, sharing their resources in terms of hardware, software and data. The possibility of exploiting the resources on a global scale has given rise to a new paradigm - the mobile computation paradigm - for computation in large scale distributed networks. The key characteristic of this paradigm is to give programmers control over the mobility of code or active computations across the network by providing appropriate language features. The dynamism and flexibility offered by mobile computation however, brings about a set of problems, the most challenging of which are relevant to safety and security. Several recent experiences prove that identifying the causes of these problems usually requires a rigorous investigation using formal methods.

Functional languages are known for their well-understood computational models and their amenability to formal reasoning. They also have strong expressive power due to higher-order features. Functions can flow from one program point to another as other first-class values. These facts suggest that functional languages can provide the core of mobile computation language. Functions that represent mobile agents and formal systems for reasoning about functional programs can be further exploited to reason about the behavior of agents.

Mobile Computation with Functions explores distributed computation with languages which adopt functions as the main programming abstraction and support code mobility through the mobility of functions between remote sites. It aims to highlight the benefits of using languages of this family in dealing with the challenges of mobile computation. The possibility of exploiting existing static analysis techniques suggests that having functions at the core of mobile code language is a particularly apt choice. A range of problems which have impact on the safety, security and performance are discussed. It is shown that types extended with effects and other annotations can capture a significant amount of information about the dynamic behavior of mobile functions, and offer solutions to the problems under investigation. This book includes a survey of the languages Concurrent ML, Facile and PLAN which inherit the strengths of the functional paradigm in the context of concurrent and distributed computation. The languages which are defined in the subsequent chapters have their roots in these languages.

Mobile Computation with Functions is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate level students in Computer Science.

Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.)
Wenliang Du
R1,954 Discovery Miles 19 540 Ships in 9 - 17 working days
Cyber Security - Critical Infrastructure Protection (Hardcover, 1st ed. 2022): Martti Lehto, Pekka Neittaanmaki Cyber Security - Critical Infrastructure Protection (Hardcover, 1st ed. 2022)
Martti Lehto, Pekka Neittaanmaki
R4,611 Discovery Miles 46 110 Ships in 12 - 19 working days

This book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security, legal aspects on cyber security, citizen in digital society, and cyber security training. The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare. The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization.

Computer and Information Security (Hardcover): Audrey Coon Computer and Information Security (Hardcover)
Audrey Coon
R3,437 R3,107 Discovery Miles 31 070 Save R330 (10%) Ships in 10 - 15 working days
Information Retrieval and Natural Language Processing - A Graph Theory Approach (Hardcover, 1st ed. 2022): Sheetal S. Sonawane,... Information Retrieval and Natural Language Processing - A Graph Theory Approach (Hardcover, 1st ed. 2022)
Sheetal S. Sonawane, Parikshit N. Mahalle, Archana S. Ghotkar
R1,798 Discovery Miles 17 980 Ships in 12 - 19 working days

This book gives a comprehensive view of graph theory in informational retrieval (IR) and natural language processing(NLP). This book provides number of graph techniques for IR and NLP applications with examples. It also provides understanding of graph theory basics, graph algorithms and networks using graph. The book is divided into three parts and contains nine chapters. The first part gives graph theory basics and graph networks, and the second part provides basics of IR with graph-based information retrieval. The third part covers IR and NLP recent and emerging applications with case studies using graph theory. This book is unique in its way as it provides a strong foundation to a beginner in applying mathematical structure graph for IR and NLP applications. All technical details that include tools and technologies used for graph algorithms and implementation in Information Retrieval and Natural Language Processing with its future scope are explained in a clear and organized format.

The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback): IT Governance The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback)
IT Governance
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback): Jenny Phillips, Alan... BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback)
Jenny Phillips, Alan Jarvis, Mark Fishpool, Richard McGill, Tim Cook, …
R1,159 Discovery Miles 11 590 Ships in 9 - 17 working days

Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.

Advances in Digital Forensics XVIII - 18th IFIP WG 11.9 International Conference, Virtual Event, January 3-4, 2022, Revised... Advances in Digital Forensics XVIII - 18th IFIP WG 11.9 International Conference, Virtual Event, January 3-4, 2022, Revised Selected Papers (Hardcover, 1st ed. 2022)
Gilbert Peterson, Sujeet Shenoi
R2,637 Discovery Miles 26 370 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVIII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: This book is the eighteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of eleven edited papers from the Eighteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, a fully-virtual event held in the winter of 2022.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Indigenous Environmental Knowledge…
John Edington Hardcover R5,649 Discovery Miles 56 490
Correction of Differential Settlements…
Efrain Ovando-Shelley, Enrique Santoyo Hardcover R4,041 Discovery Miles 40 410
Handbook of Scholarly Publications from…
Adedeji B. Badiru, Frank W. Ciarallo, … Hardcover R4,829 Discovery Miles 48 290
Law and Intangible Cultural Heritage in…
Sara Ross Hardcover R4,469 Discovery Miles 44 690
Handbook of Mathematical and Digital…
Adedeji B. Badiru, Olumuyiwa Asaolu Hardcover R5,228 Discovery Miles 52 280
Psychological Assessment in South Africa…
Sumaya Laher, Kate Cockcroft, … Paperback R600 R541 Discovery Miles 5 410
The Unresolved National Question - Left…
Edward Webster, Karin Pampallis Paperback  (2)
R395 R365 Discovery Miles 3 650
Annual Reports on NMR Spectroscopy…
Graham A. Webb Hardcover R6,991 R5,852 Discovery Miles 58 520
Disney Tim Burton's the Nightmare Before…
Tim Burton Paperback  (3)
R253 R215 Discovery Miles 2 150
Math Limericks - Learn Integers Using…
Janet M Parker Hardcover R580 R524 Discovery Miles 5 240

 

Partners