0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,156)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Secrets of a Cyber Security Architect (Paperback): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Paperback)
Brook S. E. Schoenfield
R1,384 Discovery Miles 13 840 Ships in 10 - 15 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

Privacy and Data Protection in Software Services (Hardcover, 1st ed. 2022): Roberto Senigaglia, Claudia Irti, Alessandro Bernes Privacy and Data Protection in Software Services (Hardcover, 1st ed. 2022)
Roberto Senigaglia, Claudia Irti, Alessandro Bernes
R4,634 Discovery Miles 46 340 Ships in 10 - 15 working days

The aim of the book is to create a bridge between two 'lands' that are usually kept separate: technical tools and legal rules should be bound together for moulding a special 'toolbox' to solve present and future issues. The volume is intended to contribute to this 'toolbox' in the area of software services, while addressing how to make legal studies work closely with engineers' and computer scientists' fields of expertise, who are increasingly involved in tangled choices on daily programming and software development. In this respect, law has not lost its importance and its own categories in the digital world, but as well as any social science needs to experience a new realistic approach amid technological development and individuals' fundamental rights and freedoms.

Blockchain Gaps - From Myth to Real Life (Hardcover, 1st ed. 2021): Shin'ichiro Matsuo, Nat Sakimura Blockchain Gaps - From Myth to Real Life (Hardcover, 1st ed. 2021)
Shin'ichiro Matsuo, Nat Sakimura
R2,200 Discovery Miles 22 000 Ships in 18 - 22 working days

This book analyzes the fundamental issues faced when blockchain technology is applied to real-life applications. These concerns, not only in the realm of computer science, are caused by the nature of technological design. Blockchain is considered the foundation of a wide range of flexible ecosystems; its technology is an excellent mixture of mathematics, cryptography, incentive mechanisms, economics, and pertinent regulations. The book provides an essential understanding of why such fundamental issues arise, by revising the underlying theories. Blockchain theory is thus presented in an easy-to-understand, useful manner. Also explained is the reason why blockchain is hard to adopt for real-life problems but is valuable as a foundation for flexible ecosystems. Included are directions for solving those problems and finding suitable areas for blockchain applications in the future. The authors of this work are experts from a wide range of backgrounds such as cryptography, distributed computing, computer science, trust, identity, regulation, and standardization. Their contributions collected here will appeal to all who are interested in blockchain and the elements surrounding it.

Data Protection and Privacy: (In)visibilities and Infrastructures (Hardcover, 1st ed. 2017): Ronald Leenes, Rosamunde van... Data Protection and Privacy: (In)visibilities and Infrastructures (Hardcover, 1st ed. 2017)
Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, Paul De Hert
R5,358 Discovery Miles 53 580 Ships in 10 - 15 working days

This book features peer reviewed contributions from across the disciplines on themes relating to protection of data and to privacy protection. The authors explore fundamental and legal questions, investigate case studies and consider concepts and tools such as privacy by design, the risks of surveillance and fostering trust. Readers may trace both technological and legal evolution as chapters examine current developments in ICT such as cloud computing and the Internet of Things. Written during the process of the fundamental revision of revision of EU data protection law (the 1995 Data Protection Directive), this volume is highly topical. Since the European Parliament has adopted the General Data Protection Regulation (Regulation 2016/679), which will apply from 25 May 2018, there are many details to be sorted out. This volume identifies and exemplifies key, contemporary issues. From fundamental rights and offline alternatives, through transparency requirements to health data breaches, the reader is provided with a rich and detailed picture, including some daring approaches to privacy and data protection. The book will inform and inspire all stakeholders. Researchers with an interest in the philosophy of law and philosophy of technology, in computers and society, and in European and International law will all find something of value in this stimulating and engaging work.

Smart Log Data Analytics - Techniques for Advanced Security Analysis (Hardcover, 1st ed. 2021): Florian Skopik, Markus... Smart Log Data Analytics - Techniques for Advanced Security Analysis (Hardcover, 1st ed. 2021)
Florian Skopik, Markus Wurzenberger, Max Landauer
R3,987 Discovery Miles 39 870 Ships in 10 - 15 working days

This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.

Innovation in Crisis Management (Hardcover): Chiara Fonio, Adam Widera, Tomasz Zweglinski Innovation in Crisis Management (Hardcover)
Chiara Fonio, Adam Widera, Tomasz Zweglinski
R3,809 Discovery Miles 38 090 Ships in 10 - 15 working days

This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.

Transparent User Authentication - Biometrics, RFID and Behavioural Profiling (Hardcover, Edition.): Nathan Clarke Transparent User Authentication - Biometrics, RFID and Behavioural Profiling (Hardcover, Edition.)
Nathan Clarke
R2,669 Discovery Miles 26 690 Ships in 18 - 22 working days

This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication - where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.

Data Spaces - Design, Deployment and Future Directions (Hardcover, 1st ed. 2022): Edward Curry, Simon Scerri, Tuomo Tuikka Data Spaces - Design, Deployment and Future Directions (Hardcover, 1st ed. 2022)
Edward Curry, Simon Scerri, Tuomo Tuikka
R1,572 Discovery Miles 15 720 Ships in 18 - 22 working days

This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical.

Proceedings of International Symposium on Sensor Networks, Systems and Security - Advances in Computing and Networking with... Proceedings of International Symposium on Sensor Networks, Systems and Security - Advances in Computing and Networking with Applications (Hardcover, 1st ed. 2018)
Nageswara S.V. Rao, Richard R. Brooks, Chase Q. Wu
R4,727 Discovery Miles 47 270 Ships in 18 - 22 working days

This book presents current trends that are dominating technology and society, including privacy, high performance computing in the cloud, networking and IoT, and bioinformatics. By providing chapters detailing accessible descriptions of the research frontiers in each of these domains, the reader is provided with a unique understanding of what is currently feasible. Readers are also given a vision of what these technologies can be expected to produce in the near future. The topics are covered comprehensively by experts in respective areas. Each section includes an overview that puts the research topics in perspective and integrates the sections into an overview of how technology is evolving. The book represents the proceedings of the International Symposium on Sensor Networks, Systems and Security, August 31 - September 2, 2017, Lakeland Florida.

The Art of War for Computer Security (Hardcover, 1st ed. 2019): Tom Madsen The Art of War for Computer Security (Hardcover, 1st ed. 2019)
Tom Madsen
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.

Building an Effective IoT Ecosystem for Your Business (Hardcover, 1st ed. 2017): Sudhi R. Sinha, Youngchoon Park Building an Effective IoT Ecosystem for Your Business (Hardcover, 1st ed. 2017)
Sudhi R. Sinha, Youngchoon Park
R4,043 Discovery Miles 40 430 Ships in 10 - 15 working days

This descriptive, practical guide explains how to build a commercially impactful, operationally effective and technically robust IoT ecosystem that takes advantage of the IoT revolution and drives business growth in the consumer IoT as well as industrial internet spaces. With this book, executives, business managers, developers and decision-makers are given the tools to make more informed decisions about IoT solution development, partner eco-system design, and the monetization of products and services. Security and privacy issues are also addressed. Readers will explore the design guidelines and technology choices required to build commercially viable IoT solutions, but also uncover the various monetization and business modeling for connected products.

Security Fundamentals for E-commerce (Hardcover): Vesna Hassler Security Fundamentals for E-commerce (Hardcover)
Vesna Hassler 1
R2,617 Discovery Miles 26 170 Ships in 18 - 22 working days

In the world of e-commerce, security has quickly become of paramount importance. This unique book provides an in-depth understanding of basic security problems and relevant e-commerce solutions. From designing secure Web, e-commerce, and mobile commerce applications to securing internal networks to providing secure employee/user authentication, this cutting-edge book gives professionals the tools they need to solve their e-commerce security problems.

Transformations Through Blockchain Technology - The New Digital Revolution (Hardcover, 1st ed. 2022): Sheikh Mohammad Idrees,... Transformations Through Blockchain Technology - The New Digital Revolution (Hardcover, 1st ed. 2022)
Sheikh Mohammad Idrees, Mariusz Nowostawski
R3,359 Discovery Miles 33 590 Ships in 10 - 15 working days

The book serves as a connecting medium between various domains and Blockchain technology, discussing and embracing how Blockchain technology is transforming all the major sectors of the society. The book facilitates sharing of information, case studies, theoretical and practical knowledge required for Blockchain transformations in various sectors. The book covers different areas that provide the foundational knowledge and comprehensive information about the transformations by Blockchain technology in the fields of business, healthcare, finance, education, supply-chain, sustainability and governance. The book pertains to students, academics, researchers, professionals, and policy makers working in the area of Blockchain technology and related fields.

Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016): Mohammad A. Tayebi,... Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016)
Mohammad A. Tayebi, Uwe Glasser
R3,286 R2,916 Discovery Miles 29 160 Save R370 (11%) Ships in 10 - 15 working days

This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.

Military Applications of Data Analytics (Paperback): Kevin Huggins Military Applications of Data Analytics (Paperback)
Kevin Huggins
R1,380 Discovery Miles 13 800 Ships in 10 - 15 working days

Military organizations around the world are normally huge producers and consumers of data. Accordingly, they stand to gain from the many benefits associated with data analytics. However, for leaders in defense organizations-either government or industry-accessible use cases are not always available. This book presents a diverse collection of cases that explore the realm of possibilities in military data analytics. These use cases explore such topics as: Context for maritime situation awareness Data analytics for electric power and energy applications Environmental data analytics in military operations Data analytics and training effectiveness evaluation Harnessing single board computers for military data analytics Analytics for military training in virtual reality environments A chapter on using single board computers explores their application in a variety of domains, including wireless sensor networks, unmanned vehicles, and cluster computing. The investigation into a process for extracting and codifying expert knowledge provides a practical and useful model for soldiers that can support diagnostics, decision making, analysis of alternatives, and myriad other analytical processes. Data analytics is seen as having a role in military learning, and a chapter in the book describes the ongoing work with the United States Army Research Laboratory to apply data analytics techniques to the design of courses, evaluation of individual and group performances, and the ability to tailor the learning experience to achieve optimal learning outcomes in a minimum amount of time. Another chapter discusses how virtual reality and analytics are transforming training of military personnel. Virtual reality and analytics are also transforming monitoring, decision making, readiness, and operations. Military Applications of Data Analytics brings together a collection of technical and application-oriented use cases. It enables decision makers and technologists to make connections between data analytics and such fields as virtual reality and cognitive science that are driving military organizations around the world forward.

Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (Hardcover): Ashish Kumar Luhach, Atilla Elci Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (Hardcover)
Ashish Kumar Luhach, Atilla Elci
R6,205 Discovery Miles 62 050 Ships in 18 - 22 working days

Cyber-physical systems (CPS) have emerged as a unifying name for systems where cyber parts (i.e., the computing and communication parts) and physical parts are tightly integrated, both in design and during operation. Such systems use computations and communication deeply embedded in and interacting with human physical processes as well as augmenting existing and adding new capabilities. As such, CPS is an integration of computation, networking, and physical processes. Embedded computers and networks monitor and control the physical processes, with feedback loops where physical processes affect computations and vice versa. The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology. Artificial Intelligence Paradigms for Smart Cyber-Physical Systems focuses on the recent advances in Artificial intelligence-based approaches towards affecting secure cyber-physical systems. This book presents investigations on state-of-the-art research issues, applications, and achievements in the field of computational intelligence paradigms for CPS. Covering topics that include autonomous systems, access control, machine learning, and intrusion detection and prevention systems, this book is ideally designed for engineers, industry professionals, practitioners, scientists, managers, students, academicians, and researchers seeking current research on artificial intelligence and cyber-physical systems.

Security and Organization within IoT and Smart Cities (Paperback): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Paperback)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R1,390 Discovery Miles 13 900 Ships in 10 - 15 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Evolutionary Computing and Mobile Sustainable Networks - Proceedings of ICECMSN 2020 (Hardcover, 1st ed. 2021): V. Suma,... Evolutionary Computing and Mobile Sustainable Networks - Proceedings of ICECMSN 2020 (Hardcover, 1st ed. 2021)
V. Suma, Noureddine Bouhmala, Haoxiang Wang
R5,370 Discovery Miles 53 700 Ships in 18 - 22 working days

This book features selected research papers presented at the International Conference on Evolutionary Computing and Mobile Sustainable Networks (ICECMSN 2020), held at the Sir M. Visvesvaraya Institute of Technology on 20-21 February 2020. Discussing advances in evolutionary computing technologies, including swarm intelligence algorithms and other evolutionary algorithm paradigms which are emerging as widely accepted descriptors for mobile sustainable networks virtualization, optimization and automation, this book is a valuable resource for researchers in the field of evolutionary computing and mobile sustainable networks.

Cybertax - Managing the Risks and Results (Hardcover): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Hardcover)
George K. Tsantes, James Ransome
R3,200 Discovery Miles 32 000 Ships in 10 - 15 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

IT Convergence and Security - Proceedings of ICITCS 2020 (Hardcover, 1st ed. 2021): Hyuncheol Kim, Kuinam J. Kim IT Convergence and Security - Proceedings of ICITCS 2020 (Hardcover, 1st ed. 2021)
Hyuncheol Kim, Kuinam J. Kim
R1,413 Discovery Miles 14 130 Ships in 18 - 22 working days

This volume comprises the proceedings of ICITCS 2020. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security is core to most current research, industrial and commercial activities. Topics covered in this volume include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, healthcare and wellness, web technology and applications, internet of things, and security & privacy. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book will be of use to researchers in academia, industry and other research institutes focusing on IT convergence and security.

Applications of Blockchain and Big IoT Systems - Digital Solutions for Diverse Industries (Hardcover): Arun Solanki, Vishal... Applications of Blockchain and Big IoT Systems - Digital Solutions for Diverse Industries (Hardcover)
Arun Solanki, Vishal Jain, Loveleen Gaur
R4,319 Discovery Miles 43 190 Ships in 10 - 15 working days

This new volume explores a plethora of blockchain-based solutions for big data and IoT applications, looking at advances in real-world applications in several sectors, including higher education, cybersecurity, agriculture, business and management, healthcare and biomedical science, construction and project management, smart city development, and others. Chapters explore emerging technology to combat the ever-increasing threat of security to computer systems and offer new architectural solutions for problems encountered in data management and security. The chapters help to provide a high level of understanding of various blockchain algorithms along with the necessary tools and techniques. The novel architectural solutions in the deployment of blockchain presented here are the core of the book.

Cybertax - Managing the Risks and Results (Paperback): George K. Tsantes, James Ransome Cybertax - Managing the Risks and Results (Paperback)
George K. Tsantes, James Ransome
R547 Discovery Miles 5 470 Ships in 10 - 15 working days

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax-Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non-cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C's for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance, sales, human resources, and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks, such as sales, finances, resources, and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leader ships' attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,243 Discovery Miles 12 430 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Information Security Management - Concepts and Practice (Hardcover, 3rd Edition): Bel G. Raggad Information Security Management - Concepts and Practice (Hardcover, 3rd Edition)
Bel G. Raggad
R2,975 Discovery Miles 29 750 Ships in 10 - 15 working days

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs.

An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.

This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment—including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.

Table of Contents

INTRODUCTION

Introduction to Information Security Management

Why Information Security Matters

Information Sensitivity Classification

Information Security Governance

The Computing Environment

Security of Various Components in the Computing

Environment

Security Interdependence

CIA Triad

Security Goals versus Business Goals

The Security Star

Parker’s View of Information Security

What Is Information Security Management?

Defense-In-Depth Security

Security Controls

The NSA Triad for Security Assessment

Introduction to Management Concepts

Brief History of Management

Traditional Management Skills and Security Literacy

Managerial Skills

Redefining Mintzberg’s Managerial Roles

Strategic Management Concepts

IS Security Management Activities

Do We Really Need an Independent Information Security Functional Unit?

The Information Security Management Cycle

IS Security Management versus Functional Management

The Information Security Life Cycle

Security Planning in the SLC

Security Analysis

Security Design

Security Implementation

Security Review

Continual Security

SECURITY PLAN

Security Plan

SP Development Guidelines

SP Methodology

Security Policy

Security Policy, Standards, and Guidelines

Security Policy Methodologies

Business Continuity Planning

Business Disruptions

Business Continuity

Disaster Recovery

Responding to Business Disruptions

Developing a BCP

SECURITY ANALYSIS

Security Risk Management

The Risk Management Life Cycle

The Preparation Effort for Risk Management

A Sustainable Security Culture

Information Needed to Manage Risks

Factors Affecting Security Risk

The ALE Risk Methodology

Operational, Functional, and Strategic Risks

Operational Risk Management: Case of the Naval Safety Center

The ABLE Methodology

Continual Security: Integrated Fault-Event Analysis and Response Framework (IFEAR)

IFEAR Methodology

Fault Tree Analysis

Event Tree Analysis

FTA-ETA Integration

Risk Management

|Simulation and Sensitivity Analysis

Active Security Assessment

Standards for Active Security Assessment

Limits of Active Security Assessment

Can You Hack Your Own System?

Ethical Hacking of a Computing Environment

Ethics in Ethical Hacking

ASA through Penetration Testing

Strategies for Active Security Assessment

Guidelines and Terms between Testers and the Organization

The Active Security Assessment Project

System Availability

Computer Clustering

Review of Cluster Concepts

Types of Clusters

Web Site Availability

Application Centers No Longer the Only Sound Implementation

Computation of Availability in High-Availability Cluster

Related Availability Definitions

How to Obtain Higher Availability: The Cisco Process Nines’ Availability

Common Configurations for Clusters

Self-Healing and Availability

SECURITY DESIGN

Nominal Security Enhancement Design Based on ISO/IEC 27002

History of the ISO/IEC 27002

ISO/IEC 27002

How to Use the ISO/IEC 27002 to Enhance Security

Measurement and Implementations

Strategies to Enhance the ISO/IEC 27002-Based Security Posture

Comparing the ISO/IEC 27002-Based Security Posture Enhancement Strategies

Technical Security Enhancement Based on ISO/IEC 27001

How Organizations Interact with the Standards

General ISMS Framework

The ISMS Model

The Process Approach Ensures the Continual Improvement of the ISMS

Development of the Information Security Management System

Design of the ISMS

Security Inventory Needs

The Integration of ISMS Subsystems

Self-Assessment for Compliance

Revisiting ISMS Scoping

SECURITY IMPLEMENTATION

Security Solutions

Security Solutions

The NIST Security Solution Taxonomy

The ISO Security Solution Taxonomy

The Common Criteria

The Birth of the Common Criteria

Common Uses of the CC

The CC Document

The CC Security Approach

Information Resource Evaluation Methodology

CC Security Evaluation Programs

The American Model of CC Evaluation Programs

A National Model

Some Other CC Evaluation Requirements

Minicase

SECURITY REVIEW

Security Review through Security Audit

Security Audit Means Different Things to Different People

Some Security Audit Activities

Our Definition of Security Audit

Main Features in Security Audit

Application Audit

How Does Security Audit Relate to the Corporate Security Policy?

Structure of a Security Audit

Security Audit versus IT Auditing

Applicable Security-Related Standards

Security Audit Grades

Privacy Rights, Information Technology, and HIPAA

The Problem of Privacy

The Meaning of Privacy

HIPAA

Regulatory Standards: The Privacy Rule

The HIPAA Security Rule

Administrative Safeguards

NIST on HIPAA

Conducting Effective Risk Analysis

CONTINUAL SECURITY

The Sarbanes–Oxley Act and IT Compliance

Methods of Doing Business

Background of the SarbanesOxley Act

SarbanesOxley Act of 2002

Major Provisions of SO

Management Assessment of Internal Controls and IT

Compliance

IT Compliance

International Responses

Advantages to SOX Compliance

Foreign Whistleblowers and SOX

Reconciling SOX and European Conflicting Standards

EU Corporate Governance Initiatives

E.U.’s Eighth Directive

Planning IT Management for SOX: Delayed SOX Impact

Cyberterrorism and Homeland Security

Security Economic Intelligence

Homeland Security

Cyberterrorism in the Literature

Cyberterrorism in the Real World: The FBI Perspective

U.S. Legislative Enactments and Proposed Programs

U.S. Criminal Statutes Affecting the Internet

Statutes and Executive Orders Concerned with Cyberterrorism

International Initiatives

Individual European State Approaches to Security and Counterterrorism

Other International Efforts

Index

Each chapter begins with an Introduction and concludes with a Summary, Review Questions, Workshops, and References

Securing Government Information and Data in Developing Countries (Hardcover): Saleem Zoughbi Securing Government Information and Data in Developing Countries (Hardcover)
Saleem Zoughbi
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CISA - Certified Information Systems…
Cannon Paperback R1,554 R1,246 Discovery Miles 12 460
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Real-Time and Retrospective Analyses of…
David Anthony Bird Hardcover R5,324 Discovery Miles 53 240
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920

 

Partners