0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (210)
  • R250 - R500 (607)
  • R500+ (5,107)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

5G and Beyond - The Future of IoT (Hardcover): Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak 5G and Beyond - The Future of IoT (Hardcover)
Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak
R3,935 Discovery Miles 39 350 Ships in 10 - 15 working days

1) This book presents a two-fold approach to the topic. On one hand it discusses the fundamentals and theoretical concepts of 5G with respect to the IoT, and on the other hand it showcases some impactful and trending research in this field. Clearly, IoT is an interdisciplinary field and therefore this book would be useful to different stakeholders related to mobile communications and IoT networking architecture. 2) IoT is one of the most trending topics worldwide and 5G is coming into force across the world. Hence there would be demand for this topic 3) As compared to competition, the proposed book has updated content. It is written completely with the consideration of 5G inclusion worldwide in 2020, state-of-the-art research across the globe presented in diverse chapters, dual approach of conceptual and research/implementational perspectives put together.

Transforming Cybersecurity Solutions using Blockchain (Hardcover, 1st ed. 2021): Rashmi Agrawal, Neha Gupta Transforming Cybersecurity Solutions using Blockchain (Hardcover, 1st ed. 2021)
Rashmi Agrawal, Neha Gupta
R3,798 Discovery Miles 37 980 Ships in 18 - 22 working days

This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. The book's security and privacy analysis help with an understanding of the basics of blockchain, and it explores the quantifying impact of the new attack surfaces introduced by blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. It follows a practical approach to help understand how blockchain technology is used to transform cybersecurity solutions.

Recent Trends in Communication, Computing, and Electronics - Select Proceedings of IC3E 2018 (Hardcover, 1st ed. 2019): Ashish... Recent Trends in Communication, Computing, and Electronics - Select Proceedings of IC3E 2018 (Hardcover, 1st ed. 2019)
Ashish Khare, Uma Shankar Tiwary, Ishwar K. Sethi, Nar Singh
R5,260 Discovery Miles 52 600 Ships in 18 - 22 working days

This book presents select papers from the International Conference on Emerging Trends in Communication, Computing and Electronics (IC3E 2018). Covering the latest theories and methods in three related fields - electronics, communication and computing, it describes cutting-edge methods and applications in the areas of signal and image processing, cyber security, human-computer interaction, machine learning, electronic devices, nano-electronics, wireless sensor networks, antenna and wave propagation, and mobile communication. The contents of this book will be beneficial to students, researchers, and professionals working in the field of networks and communications.

Secure Data Science - Integrating Cyber Security and Data Science (Hardcover): Murat Kantarcioglu, Latifur Khan, Bhavani... Secure Data Science - Integrating Cyber Security and Data Science (Hardcover)
Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham
R3,540 Discovery Miles 35 400 Ships in 10 - 15 working days

Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area-including healthcare, finance, manufacturing, and marketing-could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science. After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media. This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.

Information Fusion in Distributed Sensor Networks with Byzantines (Hardcover, 1st ed. 2021): Andrea Abrardo, Mauro Barni,... Information Fusion in Distributed Sensor Networks with Byzantines (Hardcover, 1st ed. 2021)
Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi
R3,332 Discovery Miles 33 320 Ships in 18 - 22 working days

This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory.

Digitalisation and Human Security - A Multi-Disciplinary Approach to Cybersecurity in the European High North (Hardcover, 1st... Digitalisation and Human Security - A Multi-Disciplinary Approach to Cybersecurity in the European High North (Hardcover, 1st ed. 2020)
Mirva Salminen, Gerald Zojer, Kamrul Hossain
R3,997 Discovery Miles 39 970 Ships in 10 - 15 working days

This book constructs a multidisciplinary approach to human security questions related to digitalisation in the European High North i.e. the northernmost areas of Scandinavia, Finland and North-Western Russia. It challenges the mainstream conceptualisation of cybersecurity and reconstructs it with the human being as the referent object of security.

Cybersecurity - A Practical Engineering Approach (Hardcover): Henrique M. D. Santos Cybersecurity - A Practical Engineering Approach (Hardcover)
Henrique M. D. Santos
R2,280 Discovery Miles 22 800 Ships in 10 - 15 working days

Uses a modular structure, oriented to solve several small-sized cybersecurity problems, each workable in about two weeks with a hands-on approach Evolves from the experience of educating students for more than ten years, following the same principle Includes tutorial work that guides students through a development model aiming to stimulate specific education for non-functional requirements implementation Integrates well-known multimedia resources aiming to explain background concepts and to familiarize students with technological tools. Provides many examples generated from actual occurrences, including those generated by European and NATO experiences

Internet of Things Security and Data Protection (Hardcover, 1st ed. 2019): Sebastien Ziegler Internet of Things Security and Data Protection (Hardcover, 1st ed. 2019)
Sebastien Ziegler
R4,634 Discovery Miles 46 340 Ships in 10 - 15 working days

This book provides an overview of the most recent developments in Internet of Things (IoT) security and data protection. It presents the results of several international research projects addressing this topic from complementary angles. It starts by analyzing the main privacy and security threats on IoT, as well as the evolution of data protection norms, such as the European General Data Protection Regulation (GDPR), and their impact on IoT. Through a comprehensive and systematic approach, the contributors present new perspectives on IoT & Cloud Computing security requirements. They discuss the most recent approach to support trusted IoT, including new models of privacy risk assessment, labeling and certification, and contractual tools (such as Privacy PACT). Practical implementations, such as in the European Large Scale Pilots on IoT for Smart Cities (Synchronicity), are presented, explaining how they address security, privacy and data protection. Finally, innovative models to secure IoT systems are presented for the network and end-nodes security, including network threats analysis.

Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and... Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and Migration - With a Foreword by Lourdes Arizpe Schlosser and a Preface by Hans Gunter Brauch (Hardcover, 1st ed. 2020)
Ursula Oswald Spring
R3,919 Discovery Miles 39 190 Ships in 18 - 22 working days

Earth at Risk in the 21st Century offers critical interdisciplinary reflections on peace, security, gender relations, migration and the environment, all of which are threatened by climate change, with women and children affected most. Deep-rooted gender discrimination is also a result of the destructive exploitation of natural resources and the pollution of soils, water, biota and air. In the Anthropocene, the management of human society and global resources has become unsustainable and has created multiple conflicts by increasing survival threats primarily for poor people in the Global South. Alternative approaches to peace and security, focusing from bottom-up on an engendered peace with sustainability, may help society and the environment to be managed in the highly fragile natural conditions of a 'hothouse Earth'. Thus, the book explores systemic alternatives based on indigenous wisdom, gift economy and the economy of solidarity, in which an alternative cosmovision fosters mutual care between humankind and nature. * Special analysis of risks to the survival of humankind in the 21st century. * Interdisciplinary studies on peace, security, gender and environment related to global environmental and climate change. * Critical reflections on gender relations, peace, security, migration and the environment * Systematic analysis of food, water, health, energy security and its nexus. * Alternative proposals from the Global South with indigenous wisdom for saving Mother Earth.

Algorithms and Applications - ALAP 2018 (Hardcover, 1st ed. 2018): Sajal K. Das, Nabendu Chaki Algorithms and Applications - ALAP 2018 (Hardcover, 1st ed. 2018)
Sajal K. Das, Nabendu Chaki
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design. The book provides solutions to a broad class of problems in diverse areas of algorithms in our daily lives in a world designed for, and increasingly controlled by algorithms. Written by eminent personalities from academia and industry, the papers included offer insights from a number of perspectives, providing an overview of the state of the art in the field. The book consists of invited talks by respected speakers, papers presented in technical sessions, and tutorials to offer ideas, results, work-in-progress and experiences of various algorithmic aspects of computational science and engineering.

Hacking the Human - Social Engineering Techniques and Security Countermeasures (Paperback): Ian Mann Hacking the Human - Social Engineering Techniques and Security Countermeasures (Paperback)
Ian Mann
R1,057 Discovery Miles 10 570 Ships in 9 - 17 working days

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.

Authorization and Access Control - Foundations, Frameworks, and Applications (Hardcover): Parikshit N. Mahalle, Shashikant S.... Authorization and Access Control - Foundations, Frameworks, and Applications (Hardcover)
Parikshit N. Mahalle, Shashikant S. Bhong, Gitanjali R. Shinde
R1,648 Discovery Miles 16 480 Ships in 10 - 15 working days

Provides overview of security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms Discusses behavioural analysis of threats and attacks using UML base modelling Covers use of Oauth2.0 Protocol and UMA for connecting web applications Includes Role Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Permission Based Access Control (PBAC) Explores how to provide access to third party web applications through resource server by use of secured and reliable Oauth2.0 framework

Women in Security - Changing the Face of Technology and Innovation (Hardcover, 1st ed. 2018): Debra A. Christofferson Women in Security - Changing the Face of Technology and Innovation (Hardcover, 1st ed. 2018)
Debra A. Christofferson
R3,569 Discovery Miles 35 690 Ships in 10 - 15 working days

This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field's evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. After an overview of the field, female security professionals share their own stories of technology and innovation in security today; the foundation, where research is headed, and the emerging trends. Women currently make up a very small pocket of cyber security staffing - this book aims to increase the visibility of women in the field and their contributions and encourage other females to join the field. The contributors hold various roles from executive leadership, to engineers, analysts, and researchers.

The Tao of Open Source Intelligence (Paperback): Stewart K. Bertram The Tao of Open Source Intelligence (Paperback)
Stewart K. Bertram; Edited by It Governance Publishing
R1,060 Discovery Miles 10 600 Ships in 18 - 22 working days

The Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms such as those associated with social media has confirmed its dominance as the main information exchange platform for the foreseeable future. But how do you conduct an online investigation when so much of the Internet isn't even indexed by search engines? Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. Open source intelligence (OSINT) is intelligence gathered from publically available sources and is the key to unlocking this domain for the purposes of investigation. Product overview The Tao of Open Source Intelligence provides a comprehensive guide to OSINT techniques, for the investigator: It catalogues and explains the tools and investigative approaches that are required when conducting research within the surface, deep and dark webs. It explains how to scrutinise criminal activity without compromising your anonymity - and your investigation. It examines the relevance of cyber geography and how to get around its limitations. It describes useful add-ons for common search engines, as well as considering metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz and Carrot2) that collate search data from single-source intelligence platforms such as Google. It considers deep-web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, entity extraction tools and specialist search syntax (Google kung fu). It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy. OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community. The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability. About the author Stewart K. Bertram is a career intelligence analyst who has spent over a decade working across the fields of counterterrorism, cyber security, corporate investigations and geopolitical analysis. The holder of a master's degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience, having used open source intelligence on such diverse real-world topics as the terrorist use of social media in Sub-Saharan Africa and threat assessment at the London Olympic Games. Stewart teaches courses on open source intelligence as well as practising what he preaches in his role as a cyber threat intelligence manager for some of the world's leading private-sector intelligence and security agencies.

Cyber Security Politics - Socio-Technological Transformations and Political Fragmentation (Hardcover): Myriam Dunn Cavelty,... Cyber Security Politics - Socio-Technological Transformations and Political Fragmentation (Hardcover)
Myriam Dunn Cavelty, Andreas Wenger
R4,505 Discovery Miles 45 050 Ships in 10 - 15 working days

This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyber space in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertainties. Within this, it highlights four key debates that encapsulate the complexities and paradoxes of cyber security politics from a Western perspective - how much political influence states can achieve via cyber operations and what context factors condition the (limited) strategic utility of such operations; the role of emerging digital technologies and how the dynamics of the tech innovation process reinforce the fragmentation of the governance space; how states attempt to uphold stability in cyberspace and, more generally, in their strategic relations; and how the shared responsibility of state, economy, and society for cyber security continues to be re-negotiated in an increasingly trans-sectoral and transnational governance space. This book will be of much interest to students of cyber security, global governance, technology studies, and international relations. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.

EU Personal Data Protection in Policy and Practice (Hardcover, 1st ed. 2019): Bart Custers, Alan M Sears, Francien Dechesne,... EU Personal Data Protection in Policy and Practice (Hardcover, 1st ed. 2019)
Bart Custers, Alan M Sears, Francien Dechesne, Ilina Georgieva, Tommaso Tani, …
R2,222 Discovery Miles 22 220 Ships in 18 - 22 working days

In this book, the protection of personal data is compared for eight EU member states,namely France, Germany, the United Kingdom, Ireland, Romania, Italy, Sweden andthe Netherlands. The comparison of the countries is focused on government policiesfor the protection of personal data, the applicable laws and regulations, implementationof those laws and regulations, and supervision and enforcement. Although the General Data Protection Regulation (GDPR) harmonizes the protectionof personal data across the EU as of May 2018, its open norms in combination withcultural differences between countries result in differences in the practical implementation,interpretation and enforcement of personal data protection. With its focus on data protection law in practice, this book provides indepth insightsinto how different countries deal with data protection issues. The knowledge and bestpractices from these countries provide highly relevant material for legal professionals,data protection officers, policymakers, data protection authorities and academicsacross Europe. Bart Custers is Associate Professor and Director of Research at the Center for Law andDigital Technologies of the Leiden Law School at Leiden University, the Netherlands.Alan M. Sears, Francien Dechesne, Ilina Georgieva and Tommaso Tani are all affiliated tothat same organization, of which Professor Simone van der Hof is the General Director.

Build a Security Culture (Paperback): Kai Roer Build a Security Culture (Paperback)
Kai Roer; Edited by It Governance Publishing
R572 Discovery Miles 5 720 Ships in 10 - 15 working days

Protect your organisation by building a security-minded culture "With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a firm basis on which to build an effective cyber security training programme." Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Washington, D.C. Human nature - easy prey for hackers? Human behaviour is complex and inconsistent, making it a rich hunting ground for would-be hackers and a significant risk to the security of your organisation . An effective way to address this risk is to create a culture of security. Using the psychology of group behaviour and explaining how and why people follow social and cultural norms, the author highlights the underlying cause for many successful and easily preventable attacks. An effective framework for behavioural security In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour . He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities. Contents What is security culture? The Elements of security culture How does security culture relate to security awareness? Asking for help raises your chances of success The psychology of groups and how to use it to your benefit Measuring culture Building security culture About the author Kai Roer is a management and security consultant and trainer with extensive international experience from more than 30 countries around the world. He is a guest lecturer at several universities, and the founder of The Roer Group, a European management consulting group focusing on security culture. Kai has authored a number of books on leadership and cyber security , has been published extensively in print and online, has appeared on radio and television, and has featured in printed media. He is a columnist at Help Net Security and has been the Cloud Security Alliance Norway chapter president since 2012. Kai is a passionate public speaker who engages his audience with his entertaining style and deep knowledge of human behaviours , psychology and cyber security . He is a Fellow of the National Cybersecurity Institute and runs a blog on information security and culture (roer.com). Kai is the host of Security Culture TV, a monthly video and podcast. Series information Build a Security Culture is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.

Data Privacy and Trust in Cloud Computing - Building trust in the cloud through assurance and accountability (Hardcover, 1st... Data Privacy and Trust in Cloud Computing - Building trust in the cloud through assurance and accountability (Hardcover, 1st ed. 2021)
Theo Lynn, John G. Mooney, Lisa Van Der Werff, Grace Fox
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.

Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017): Keith Mayes, Konstantinos Markantonakis Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R2,852 Discovery Miles 28 520 Ships in 10 - 15 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

Introductory Computer Forensics - A Hands-on Practical Approach (Hardcover, 1st ed. 2018): Xiaodong Lin Introductory Computer Forensics - A Hands-on Practical Approach (Hardcover, 1st ed. 2018)
Xiaodong Lin
R2,990 Discovery Miles 29 900 Ships in 18 - 22 working days

This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students' understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.

Quantum Cryptography - From Key Distribution to Conference Key Agreement (Hardcover, 1st ed. 2021): Federico Grasselli Quantum Cryptography - From Key Distribution to Conference Key Agreement (Hardcover, 1st ed. 2021)
Federico Grasselli
R3,661 Discovery Miles 36 610 Ships in 10 - 15 working days

Rising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most extensively implemented protocol is quantum key distribution (QKD), which enables secure communication between two users. The aim of this book is to introduce the reader to state-of-the-art QKD and illustrate its recent multi-user generalization: quantum conference key agreement. With its pedagogical approach that doesn't disdain going into details, the book enables the reader to join in cutting-edge research on quantum cryptography.

Digital Business Security Development - Management Technologies (Hardcover): Digital Business Security Development - Management Technologies (Hardcover)
R4,497 Discovery Miles 44 970 Ships in 18 - 22 working days

Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.

Auditing & Security - AS/400, NT, Unix, Networks & Disaster Recovery Plans (Hardcover): YF Musaji Auditing & Security - AS/400, NT, Unix, Networks & Disaster Recovery Plans (Hardcover)
YF Musaji
R3,680 Discovery Miles 36 800 Ships in 18 - 22 working days

A complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors

This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company’s IT platforms–from the mainframe to the individual PC–as well as the networks that connect them to each other and to the global marketplace. Auditing and Security: AS/400, NT, Unix, Networks, and Disaster Recovery Plans is the first book on IT security written specifically for the auditor, detailing what controls are necessary to ensure a secure system regardless of the specific hardware, software, or architecture a company runs. The author uses helpful checklists and diagrams and a practical, rather than theoretical, method to understanding and auditing a company’s IT security systems and their requirements. This comprehensive volume covers the full range of issues relating to security audits, including:

  • Hardware and software
  • Operating systems
  • Network connections
  • The cooperation of logical and physical security systems
  • Disaster recovery planning
Cloud Security - Attacks, Techniques, Tools, and Challenges (Hardcover): Preeti Mishra, Emmanuel S. Pilli, R.C. Joshi Cloud Security - Attacks, Techniques, Tools, and Challenges (Hardcover)
Preeti Mishra, Emmanuel S. Pilli, R.C. Joshi
R3,935 Discovery Miles 39 350 Ships in 10 - 15 working days

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis - case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI - case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.

Network Forensics - Privacy and Security (Hardcover): Anchit Bijalwan Network Forensics - Privacy and Security (Hardcover)
Anchit Bijalwan
R3,942 Discovery Miles 39 420 Ships in 10 - 15 working days

This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know - how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security, all kind of network attacks, intention of an attacker, identification of attack, detection, its analysis, incident response, ethical issues, botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security, tools, Digital forensics. Differentiation among network security, computer forensics, network forensics and botnet forensics. Discussion on various cybercrimes, attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication, Computer Science and Computer Engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The European Social Charter and the…
Niklas Bruun, Klaus Loercher, … Hardcover R3,375 Discovery Miles 33 750
Empirical Modeling and Data Analysis for…
Scott A Pardo Hardcover R2,284 Discovery Miles 22 840
Encyclopedia of Spectroscopy and…
John C. Lindon, George E. Tranter, … Hardcover R59,229 Discovery Miles 592 290
Dispersion Relations in Heavily-Doped…
Kamakhya Prasad Ghatak Hardcover R2,785 Discovery Miles 27 850
Mathematical Modeling and Optimization…
Tony Hurlimann Hardcover R2,830 Discovery Miles 28 300
Language in Complexity - The Emerging…
Francesco La Mantia, Ignazio Licata, … Hardcover R3,584 R3,324 Discovery Miles 33 240
Law@Work
A. Van Niekerk, N. Smit Paperback R1,722 Discovery Miles 17 220
Employment and the law - A practical…
H. Landis, L. Grossett Paperback R1,059 R928 Discovery Miles 9 280
Employers guide to the employment equity…
Simona Tinarelli Book R723 Discovery Miles 7 230
Understanding the skills development act
S. Hammond Paperback R419 Discovery Miles 4 190

 

Partners