0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover)
Information R Management Association
R11,904 Discovery Miles 119 040 Ships in 18 - 22 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover)
Information R Management Association
R11,891 Discovery Miles 118 910 Ships in 18 - 22 working days
Research Anthology on Advancements in Cybersecurity Education (Hardcover): Information Resources Management Association Research Anthology on Advancements in Cybersecurity Education (Hardcover)
Information Resources Management Association
R10,591 Discovery Miles 105 910 Ships in 18 - 22 working days

Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. From banking to medical records to e-commerce, sensitive data has never before been at such a high risk of misuse. As such, organizations now have a greater responsibility than ever to ensure that their stakeholder data is secured, leading to the increased need for cybersecurity specialists and the development of more secure software and systems. To avoid issues such as hacking and create a safer online space, cybersecurity education is vital and not only for those seeking to make a career out of cybersecurity, but also for the general public who must become more aware of the information they are sharing and how they are using it. It is crucial people learn about cybersecurity in a comprehensive and accessible way in order to use the skills to better protect all data. The Research Anthology on Advancements in Cybersecurity Education discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data. Providing information on a range of topics from cybersecurity education requirements, cyberspace security talents training systems, and insider threats, it is ideal for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.

Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover): William Vance Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover)
William Vance
R576 R530 Discovery Miles 5 300 Save R46 (8%) Ships in 18 - 22 working days
Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover): Chris Bronk Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover)
Chris Bronk
R2,514 R2,377 Discovery Miles 23 770 Save R137 (5%) Ships in 10 - 15 working days

This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed

Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,520 R2,325 Discovery Miles 23 250 Save R195 (8%) Ships in 10 - 15 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Trusted Platform Modules - Why, when and how to use them (Hardcover): Ariel Segall Trusted Platform Modules - Why, when and how to use them (Hardcover)
Ariel Segall
R2,849 R2,589 Discovery Miles 25 890 Save R260 (9%) Ships in 18 - 22 working days

Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation. This book describes the primary uses for TPMs, and practical considerations such as when TPMs can and should be used, when they shouldn't be, what advantages they provide, and how to actually make use of them, with use cases and worked examples of how to implement these use cases on a real system. Topics covered include when to use a TPM; TPM concepts and functionality; programming introduction; provisioning: getting the TPM ready to use; first steps: TPM keys; machine authentication; data protection; attestation; other TPM features; software and specifications; and troubleshooting. Appendices contain basic cryptographic concepts; command equivalence and requirements charts; and complete code samples.

Data Breach Preparation and Response - Breaches are Certain, Impact is Not (Paperback): Kevvie Fowler Data Breach Preparation and Response - Breaches are Certain, Impact is Not (Paperback)
Kevvie Fowler
R1,374 Discovery Miles 13 740 Ships in 10 - 15 working days

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,286 Discovery Miles 52 860 Ships in 18 - 22 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

Modern Cryptography - Current Challenges and Solutions (Hardcover): Menachem Domb Modern Cryptography - Current Challenges and Solutions (Hardcover)
Menachem Domb
R3,059 Discovery Miles 30 590 Ships in 18 - 22 working days
Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback): Vasileios Karyotis, M. H. R.... Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback)
Vasileios Karyotis, M. H. R. Khouzani
R2,293 R2,171 Discovery Miles 21 710 Save R122 (5%) Ships in 10 - 15 working days

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover): Metodi Hadji-Janev, Mitko... Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover)
Metodi Hadji-Janev, Mitko Bogdanoski
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.

Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback): I.S. Dr. Amiri, M. R. K. Soltanian Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback)
I.S. Dr. Amiri, M. R. K. Soltanian
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover)
Information R Management Association
R13,760 Discovery Miles 137 600 Ships in 18 - 22 working days
Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback): Florian Skopik, Paul Dr. Smith Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback)
Florian Skopik, Paul Dr. Smith
R2,166 Discovery Miles 21 660 Ships in 10 - 15 working days

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

Cyber Security (Hardcover): Yu Zhou, Jia Li, Li Ding Cyber Security (Hardcover)
Yu Zhou, Jia Li, Li Ding
R1,297 Discovery Miles 12 970 Ships in 18 - 22 working days
Information Security: Procedures, Standards and Management (Hardcover): Fiona Hobbs Information Security: Procedures, Standards and Management (Hardcover)
Fiona Hobbs
R3,279 R2,969 Discovery Miles 29 690 Save R310 (9%) Ships in 18 - 22 working days
Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover)
Information R Management Association
R13,746 Discovery Miles 137 460 Ships in 18 - 22 working days
Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover): Mohammad Shahid Husain, Mohammad Zunnun Khan Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover)
Mohammad Shahid Husain, Mohammad Zunnun Khan
R6,163 Discovery Miles 61 630 Ships in 18 - 22 working days

Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.

Computer and Network Security (Hardcover): Jaydip Sen Computer and Network Security (Hardcover)
Jaydip Sen
R3,076 Discovery Miles 30 760 Ships in 18 - 22 working days
Securing VoIP - Keeping Your VoIP Network Safe (Paperback): Regis J. Jr (Bud) Bates Securing VoIP - Keeping Your VoIP Network Safe (Paperback)
Regis J. Jr (Bud) Bates
R1,030 Discovery Miles 10 300 Ships in 10 - 15 working days

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback): Babak Akhgar,... Application of Big Data for National Security - A Practitioner's Guide to Emerging Technologies (Paperback)
Babak Akhgar, Gregory B Saathoff, Hamid R Arabnia, Richard Hill, Andrew Staniforth, …
R1,382 Discovery Miles 13 820 Ships in 10 - 15 working days

Application of Big Data for National Security provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue. The strategic frameworks and critical factors presented in Application of Big Data for National Security consider technical, legal, ethical, and societal impacts, but also practical considerations of Big Data system design and deployment, illustrating how data and security concerns intersect. In identifying current and future technical and operational challenges it supports law enforcement and government agencies in their operational, tactical and strategic decisions when employing Big Data for national security

TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R893 R812 Discovery Miles 8 120 Save R81 (9%) Ships in 18 - 22 working days
Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback): Parisa Dr. Naraei,... Optimizing IEEE 802.11i Resource and Security Essentials - For Mobile and Stationary Devices (Paperback)
Parisa Dr. Naraei, I.S. Dr. Amiri, Iman Dr. Saberi
R1,269 Discovery Miles 12 690 Ships in 10 - 15 working days

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R7,977 Discovery Miles 79 770
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R5,931 Discovery Miles 59 310
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470

 

Partners