0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,097)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover): Arif Sari Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism (Hardcover)
Arif Sari
R4,875 Discovery Miles 48 750 Ships in 18 - 22 working days

Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.

Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 3 (Hardcover)
Information R Management Association
R13,766 Discovery Miles 137 660 Ships in 18 - 22 working days
Hackable - How to Do Application Security Right (Hardcover): Ted Harrington Hackable - How to Do Application Security Right (Hardcover)
Ted Harrington
R668 R607 Discovery Miles 6 070 Save R61 (9%) Ships in 18 - 22 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 2 (Hardcover)
Information R Management Association
R11,904 Discovery Miles 119 040 Ships in 18 - 22 working days
Quantum Cryptography in Advanced Networks (Hardcover): Oleg G. Morozov Quantum Cryptography in Advanced Networks (Hardcover)
Oleg G. Morozov
R2,550 Discovery Miles 25 500 Ships in 18 - 22 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 1 (Hardcover)
Information R Management Association
R11,891 Discovery Miles 118 910 Ships in 18 - 22 working days
Research Anthology on Advancements in Cybersecurity Education (Hardcover): Information Resources Management Association Research Anthology on Advancements in Cybersecurity Education (Hardcover)
Information Resources Management Association
R10,591 Discovery Miles 105 910 Ships in 18 - 22 working days

Modern society has become dependent on technology, allowing personal information to be input and used across a variety of personal and professional systems. From banking to medical records to e-commerce, sensitive data has never before been at such a high risk of misuse. As such, organizations now have a greater responsibility than ever to ensure that their stakeholder data is secured, leading to the increased need for cybersecurity specialists and the development of more secure software and systems. To avoid issues such as hacking and create a safer online space, cybersecurity education is vital and not only for those seeking to make a career out of cybersecurity, but also for the general public who must become more aware of the information they are sharing and how they are using it. It is crucial people learn about cybersecurity in a comprehensive and accessible way in order to use the skills to better protect all data. The Research Anthology on Advancements in Cybersecurity Education discusses innovative concepts, theories, and developments for not only teaching cybersecurity, but also for driving awareness of efforts that can be achieved to further secure sensitive data. Providing information on a range of topics from cybersecurity education requirements, cyberspace security talents training systems, and insider threats, it is ideal for educators, IT developers, education professionals, education administrators, researchers, security analysts, systems engineers, software security engineers, security professionals, policymakers, and students.

Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover): William Vance Linux for Hackers - A Comprehensive Beginners Guide to the World of Hacking Using Linux (Hardcover)
William Vance
R576 R530 Discovery Miles 5 300 Save R46 (8%) Ships in 18 - 22 working days
Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover): Chris Bronk Cyber Threat - The Rise of Information Geopolitics in U.S. National Security (Hardcover)
Chris Bronk
R2,514 R2,377 Discovery Miles 23 770 Save R137 (5%) Ships in 10 - 15 working days

This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed

Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback): Jorge... Intelligent Data Analysis for e-Learning - Enhancing Security and Trustworthiness in Online Learning Systems (Paperback)
Jorge Miguel, Santi Caballe, Fatos Xhafa
R2,520 R2,325 Discovery Miles 23 250 Save R195 (8%) Ships in 10 - 15 working days

Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as processing this data is costly, the book offers a parallel processing paradigm that can support learning activities in real-time. The book discusses data visualization methods for managing e-Learning, providing the tools needed to analyze the data collected. Using a case-based approach, the book concludes with models and methodologies for evaluating and validating security in e-Learning systems. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Data Breach Preparation and Response - Breaches are Certain, Impact is Not (Paperback): Kevvie Fowler Data Breach Preparation and Response - Breaches are Certain, Impact is Not (Paperback)
Kevvie Fowler
R1,374 Discovery Miles 13 740 Ships in 10 - 15 working days

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover): Regner Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM (Hardcover)
Regner Sabillon
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.

Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover): Luisa... Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments (Hardcover)
Luisa Dall'acqua, Irene M. Gironacci
R5,286 Discovery Miles 52 860 Ships in 18 - 22 working days

The enormous spread of devices gives access to virtual networks and to cyberspace areas where continuous flows of data and information are exchanged, increasing the risk of information warfare, cyber-espionage, cybercrime, and identity hacking. The number of individuals and companies that suffer data breaches has increased vertically with serious reputational and economic damage internationally. Thus, the protection of personal data and intellectual property has become a priority for many governments. Political Decision-Making and Security Intelligence: Recent Techniques and Technological Developments is an essential scholarly publication that aims to explore perspectives and approaches to intelligence analysis and performance and combines theoretical underpinnings with practical relevance in order to sensitize insights into training activities to manage uncertainty and risks in the decision-making process. Featuring a range of topics such as crisis management, policy making, and risk analysis, this book is ideal for managers, analysts, politicians, IT specialists, data scientists, policymakers, government officials, researchers, academicians, professionals, and security experts.

Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback): Vasileios Karyotis, M. H. R.... Malware Diffusion Models for Modern Complex Networks - Theory and Applications (Paperback)
Vasileios Karyotis, M. H. R. Khouzani
R2,293 R2,171 Discovery Miles 21 710 Save R122 (5%) Ships in 10 - 15 working days

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.

Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover): Metodi Hadji-Janev, Mitko... Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (Hardcover)
Metodi Hadji-Janev, Mitko Bogdanoski
R8,236 Discovery Miles 82 360 Ships in 18 - 22 working days

As the confluence of networks that is the modern Internet grows to encompass everything from nuclear reactors to home appliances, the affordances offered to the average citizen grow as well-but so, too, do the resources made available to those with malicious intent. Through the rise of Big Data and the Internet of Things, terrorist organizations today have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare-which grants great advantage to the attacker-has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. The Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare addresses the problem of cyber terrorism head-on, first through a review of current literature, and then through a series of progressive proposals aimed at researchers, professionals, and policymakers. Touching on such subjects as cyber-profiling, hacktivism, and digital counterterrorism, this collection offers the tools to begin formulating a ground-up resiliency to cybersecurity threats that starts at the civilian level.

Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback): I.S. Dr. Amiri, M. R. K. Soltanian Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback)
I.S. Dr. Amiri, M. R. K. Soltanian
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 4 (Hardcover)
Information R Management Association
R13,760 Discovery Miles 137 600 Ships in 18 - 22 working days
Edge Computing - Models, Technologies and Applications (Hardcover): Javid Taheri, Shuiguang Deng Edge Computing - Models, Technologies and Applications (Hardcover)
Javid Taheri, Shuiguang Deng
R3,687 R3,326 Discovery Miles 33 260 Save R361 (10%) Ships in 18 - 22 working days
Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback): Florian Skopik, Paul Dr. Smith Smart Grid Security - Innovative Solutions for a Modernized Grid (Paperback)
Florian Skopik, Paul Dr. Smith
R2,166 Discovery Miles 21 660 Ships in 10 - 15 working days

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times. Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.

Cyber Security (Hardcover): Yu Zhou, Jia Li, Li Ding Cyber Security (Hardcover)
Yu Zhou, Jia Li, Li Ding
R1,297 Discovery Miles 12 970 Ships in 18 - 22 working days
Information Security: Procedures, Standards and Management (Hardcover): Fiona Hobbs Information Security: Procedures, Standards and Management (Hardcover)
Fiona Hobbs
R3,279 R2,969 Discovery Miles 29 690 Save R310 (9%) Ships in 18 - 22 working days
Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover): Information R Management Association Research Anthology on Privatizing and Securing Data, VOL 2 (Hardcover)
Information R Management Association
R13,746 Discovery Miles 137 460 Ships in 18 - 22 working days
Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover): Mohammad Shahid Husain, Mohammad Zunnun Khan Critical Concepts, Standards, and Techniques in Cyber Forensics (Hardcover)
Mohammad Shahid Husain, Mohammad Zunnun Khan
R6,163 Discovery Miles 61 630 Ships in 18 - 22 working days

Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.

Computer and Network Security (Hardcover): Jaydip Sen Computer and Network Security (Hardcover)
Jaydip Sen
R3,076 Discovery Miles 30 760 Ships in 18 - 22 working days
Securing VoIP - Keeping Your VoIP Network Safe (Paperback): Regis J. Jr (Bud) Bates Securing VoIP - Keeping Your VoIP Network Safe (Paperback)
Regis J. Jr (Bud) Bates
R1,030 Discovery Miles 10 300 Ships in 10 - 15 working days

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Thoughts on Government - Occasioned by…
George Rous Paperback R374 Discovery Miles 3 740
Formal Methods: State of the Art and New…
Paul Boca, Jonathan P. Bowen, … Hardcover R2,810 Discovery Miles 28 100
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, … Paperback R350 R317 Discovery Miles 3 170
Instruction Level Parallelism
Alex Aiken, Utpal Banerjee, … Hardcover R2,735 Discovery Miles 27 350
Decolonisation - Revolution & Evolution
David Boucher, Ayesha Omar Paperback R420 R388 Discovery Miles 3 880
The United States of America Compared…
John Henry Hobart Paperback R335 Discovery Miles 3 350
Essays and Treatises on Several Subjects…
David Hume Paperback R711 Discovery Miles 7 110
Leon Louw - A Legacy Of Solutions
Tim Cohen Paperback R360 R295 Discovery Miles 2 950
Implementations of Logic Programming…
Evan Tick, Giancarlo Succi Hardcover R2,797 Discovery Miles 27 970
These Oppressions Won't Cease - An…
Robert Ross Paperback R349 R125 Discovery Miles 1 250

 

Partners