0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (613)
  • R500+ (5,095)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Applications of Blockchain and Big IoT Systems - Digital Solutions for Diverse Industries (Hardcover): Arun Solanki, Vishal... Applications of Blockchain and Big IoT Systems - Digital Solutions for Diverse Industries (Hardcover)
Arun Solanki, Vishal Jain, Loveleen Gaur
R4,319 Discovery Miles 43 190 Ships in 10 - 15 working days

This new volume explores a plethora of blockchain-based solutions for big data and IoT applications, looking at advances in real-world applications in several sectors, including higher education, cybersecurity, agriculture, business and management, healthcare and biomedical science, construction and project management, smart city development, and others. Chapters explore emerging technology to combat the ever-increasing threat of security to computer systems and offer new architectural solutions for problems encountered in data management and security. The chapters help to provide a high level of understanding of various blockchain algorithms along with the necessary tools and techniques. The novel architectural solutions in the deployment of blockchain presented here are the core of the book.

Securing Government Information and Data in Developing Countries (Hardcover): Saleem Zoughbi Securing Government Information and Data in Developing Countries (Hardcover)
Saleem Zoughbi
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.

Cyber Security for Cyber Physical Systems (Hardcover, 1st ed. 2018): Saqib Ali, Taiseera Al Balushi, Zia Nadir, Omar Khadeer... Cyber Security for Cyber Physical Systems (Hardcover, 1st ed. 2018)
Saqib Ali, Taiseera Al Balushi, Zia Nadir, Omar Khadeer Hussain
R5,225 Discovery Miles 52 250 Ships in 10 - 15 working days

This book is a pioneering yet primary general reference resource on cyber physical systems and their security concerns. Providing a fundamental theoretical background, and a clear and comprehensive overview of security issues in the domain of cyber physical systems, it is useful for students in the fields of information technology, computer science, or computer engineering where this topic is a substantial emerging area of study.

Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover): Jack M Wedam Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover)
Jack M Wedam
R702 Discovery Miles 7 020 Ships in 10 - 15 working days
Blockchain Technology in Internet of Things (Hardcover, 1st ed. 2019): Liehuang Zhu, Keke Gai, Meng Li Blockchain Technology in Internet of Things (Hardcover, 1st ed. 2019)
Liehuang Zhu, Keke Gai, Meng Li
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.

Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Hardcover): Maurice Dawson, Dakshina Ranjan... Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Hardcover)
Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
R5,339 Discovery Miles 53 390 Ships in 18 - 22 working days

In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments and organizations to steel themselves against these threats in innovative ways. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.

Information Security Management - Concepts and Practice (Hardcover, 3rd Edition): Bel G. Raggad Information Security Management - Concepts and Practice (Hardcover, 3rd Edition)
Bel G. Raggad
R3,173 Discovery Miles 31 730 Ships in 10 - 15 working days

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs.

An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.

This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment—including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.

Table of Contents

INTRODUCTION

Introduction to Information Security Management

Why Information Security Matters

Information Sensitivity Classification

Information Security Governance

The Computing Environment

Security of Various Components in the Computing

Environment

Security Interdependence

CIA Triad

Security Goals versus Business Goals

The Security Star

Parker’s View of Information Security

What Is Information Security Management?

Defense-In-Depth Security

Security Controls

The NSA Triad for Security Assessment

Introduction to Management Concepts

Brief History of Management

Traditional Management Skills and Security Literacy

Managerial Skills

Redefining Mintzberg’s Managerial Roles

Strategic Management Concepts

IS Security Management Activities

Do We Really Need an Independent Information Security Functional Unit?

The Information Security Management Cycle

IS Security Management versus Functional Management

The Information Security Life Cycle

Security Planning in the SLC

Security Analysis

Security Design

Security Implementation

Security Review

Continual Security

SECURITY PLAN

Security Plan

SP Development Guidelines

SP Methodology

Security Policy

Security Policy, Standards, and Guidelines

Security Policy Methodologies

Business Continuity Planning

Business Disruptions

Business Continuity

Disaster Recovery

Responding to Business Disruptions

Developing a BCP

SECURITY ANALYSIS

Security Risk Management

The Risk Management Life Cycle

The Preparation Effort for Risk Management

A Sustainable Security Culture

Information Needed to Manage Risks

Factors Affecting Security Risk

The ALE Risk Methodology

Operational, Functional, and Strategic Risks

Operational Risk Management: Case of the Naval Safety Center

The ABLE Methodology

Continual Security: Integrated Fault-Event Analysis and Response Framework (IFEAR)

IFEAR Methodology

Fault Tree Analysis

Event Tree Analysis

FTA-ETA Integration

Risk Management

|Simulation and Sensitivity Analysis

Active Security Assessment

Standards for Active Security Assessment

Limits of Active Security Assessment

Can You Hack Your Own System?

Ethical Hacking of a Computing Environment

Ethics in Ethical Hacking

ASA through Penetration Testing

Strategies for Active Security Assessment

Guidelines and Terms between Testers and the Organization

The Active Security Assessment Project

System Availability

Computer Clustering

Review of Cluster Concepts

Types of Clusters

Web Site Availability

Application Centers No Longer the Only Sound Implementation

Computation of Availability in High-Availability Cluster

Related Availability Definitions

How to Obtain Higher Availability: The Cisco Process Nines’ Availability

Common Configurations for Clusters

Self-Healing and Availability

SECURITY DESIGN

Nominal Security Enhancement Design Based on ISO/IEC 27002

History of the ISO/IEC 27002

ISO/IEC 27002

How to Use the ISO/IEC 27002 to Enhance Security

Measurement and Implementations

Strategies to Enhance the ISO/IEC 27002-Based Security Posture

Comparing the ISO/IEC 27002-Based Security Posture Enhancement Strategies

Technical Security Enhancement Based on ISO/IEC 27001

How Organizations Interact with the Standards

General ISMS Framework

The ISMS Model

The Process Approach Ensures the Continual Improvement of the ISMS

Development of the Information Security Management System

Design of the ISMS

Security Inventory Needs

The Integration of ISMS Subsystems

Self-Assessment for Compliance

Revisiting ISMS Scoping

SECURITY IMPLEMENTATION

Security Solutions

Security Solutions

The NIST Security Solution Taxonomy

The ISO Security Solution Taxonomy

The Common Criteria

The Birth of the Common Criteria

Common Uses of the CC

The CC Document

The CC Security Approach

Information Resource Evaluation Methodology

CC Security Evaluation Programs

The American Model of CC Evaluation Programs

A National Model

Some Other CC Evaluation Requirements

Minicase

SECURITY REVIEW

Security Review through Security Audit

Security Audit Means Different Things to Different People

Some Security Audit Activities

Our Definition of Security Audit

Main Features in Security Audit

Application Audit

How Does Security Audit Relate to the Corporate Security Policy?

Structure of a Security Audit

Security Audit versus IT Auditing

Applicable Security-Related Standards

Security Audit Grades

Privacy Rights, Information Technology, and HIPAA

The Problem of Privacy

The Meaning of Privacy

HIPAA

Regulatory Standards: The Privacy Rule

The HIPAA Security Rule

Administrative Safeguards

NIST on HIPAA

Conducting Effective Risk Analysis

CONTINUAL SECURITY

The Sarbanes–Oxley Act and IT Compliance

Methods of Doing Business

Background of the SarbanesOxley Act

SarbanesOxley Act of 2002

Major Provisions of SO

Management Assessment of Internal Controls and IT

Compliance

IT Compliance

International Responses

Advantages to SOX Compliance

Foreign Whistleblowers and SOX

Reconciling SOX and European Conflicting Standards

EU Corporate Governance Initiatives

E.U.’s Eighth Directive

Planning IT Management for SOX: Delayed SOX Impact

Cyberterrorism and Homeland Security

Security Economic Intelligence

Homeland Security

Cyberterrorism in the Literature

Cyberterrorism in the Real World: The FBI Perspective

U.S. Legislative Enactments and Proposed Programs

U.S. Criminal Statutes Affecting the Internet

Statutes and Executive Orders Concerned with Cyberterrorism

International Initiatives

Individual European State Approaches to Security and Counterterrorism

Other International Efforts

Index

Each chapter begins with an Introduction and concludes with a Summary, Review Questions, Workshops, and References

Safety, Security and Privacy for Cyber-Physical Systems (Hardcover, 1st ed. 2021): Riccardo M.G. Ferrari, Andre M. H. Teixeira Safety, Security and Privacy for Cyber-Physical Systems (Hardcover, 1st ed. 2021)
Riccardo M.G. Ferrari, Andre M. H. Teixeira
R4,294 Discovery Miles 42 940 Ships in 18 - 22 working days

This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.

Cyber Threat Intelligence for the Internet of Things (Hardcover, 1st ed. 2020): Elias Bou-Harb, Nataliia Neshenko Cyber Threat Intelligence for the Internet of Things (Hardcover, 1st ed. 2020)
Elias Bou-Harb, Nataliia Neshenko
R3,984 Discovery Miles 39 840 Ships in 10 - 15 working days

This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,359 R1,258 Discovery Miles 12 580 Save R101 (7%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023): Tuomo Sipola, Tero Kokkonen,... Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023)
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
R4,271 Discovery Miles 42 710 Ships in 18 - 22 working days

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.

Emerging Topics in Hardware Security (Hardcover, 1st ed. 2021): Mark Tehranipoor Emerging Topics in Hardware Security (Hardcover, 1st ed. 2021)
Mark Tehranipoor
R2,997 Discovery Miles 29 970 Ships in 18 - 22 working days

This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.

Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Hardcover, 1st ed. 2021): Jennifer S.... Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Hardcover, 1st ed. 2021)
Jennifer S. Raj, Abdullah M. Iliyasu, Robert Bestak, Zubair A. Baig
R8,256 Discovery Miles 82 560 Ships in 10 - 15 working days

This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.

Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 1 (Hardcover, 1st... Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 1 (Hardcover, 1st ed. 2017)
Daya K. Lobiyal, Durga Prasad Mohapatra, Atulya Nagar, Manmath N. Sahoo
R6,282 Discovery Miles 62 820 Ships in 18 - 22 working days

The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

Network Security (Hardcover): Perez Network Security (Hardcover)
Perez
R3,776 Discovery Miles 37 760 Ships in 18 - 22 working days

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

Hardware Security - A Hands-on Learning Approach (Paperback): Swarup Bhunia, Mark Tehranipoor Hardware Security - A Hands-on Learning Approach (Paperback)
Swarup Bhunia, Mark Tehranipoor
R2,213 R2,094 Discovery Miles 20 940 Save R119 (5%) Ships in 10 - 15 working days

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.

Game Theory for Security and Risk Management - From Theory to Practice (Hardcover, 1st ed. 2018): Stefan Rass, Stefan Schauer Game Theory for Security and Risk Management - From Theory to Practice (Hardcover, 1st ed. 2018)
Stefan Rass, Stefan Schauer
R3,402 Discovery Miles 34 020 Ships in 18 - 22 working days

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

High-Speed Networks - A Tutorial (Hardcover, 1st ed. 2022): Jorge Crichigno, Elie Kfoury, Elias Bou-Harb, Nasir Ghani High-Speed Networks - A Tutorial (Hardcover, 1st ed. 2022)
Jorge Crichigno, Elie Kfoury, Elias Bou-Harb, Nasir Ghani
R2,277 Discovery Miles 22 770 Ships in 18 - 22 working days

This book provides practical knowledge and skills on high-speed networks, emphasizing on Science Demilitarized Zones (Science DMZs). The Science DMZ is a high-speed network designed to facilitate the transfer of big science data which is presented in this book. These networks are increasingly important, as large data sets are now often transferred across sites. This book starts by describing the limitations of general-purpose networks which are designed for transferring basic data but face numerous challenges when transferring terabyte- and petabyte-scale data. This book follows a bottom-up approach by presenting an overview of Science DMZs and how they overcome the limitations of general-purpose networks. It also covers topics that have considerable impact on the performance of large data transfers at all layers: link layer (layer-2) and network layer (layer-3) topics such as maximum transmission unit (MTU), switch architectures, and router's buffer size; transport layer (layer-4) topics including TCP features, congestion control algorithms for high-throughput high-latency networks, flow control, and pacing; applications (layer-5) used for large data transfers and for maintenance and operation of Science DMZs; and security considerations. Most chapters incorporate virtual laboratory experiments, which are conducted using network appliances running real protocol stacks. Students in computer science, information technology and similar programs, who are interested in learning fundamental concepts related to high-speed networks and corresponding implementations will find this book useful as a textbook. This book assumes minimal familiarity with networking, typically covered in an introductory networking course. It is appropriate for an upper-level undergraduate course and for a first-year graduate course. Industry professionals working in this field will also want to purchase this book.

Virtualization with Microsoft Virtual Server 2005 (Paperback): Andy Jones, Rogier Dittner, David Rule, Ken Majors, Aaron... Virtualization with Microsoft Virtual Server 2005 (Paperback)
Andy Jones, Rogier Dittner, David Rule, Ken Majors, Aaron Tiensivu, …
R1,364 Discovery Miles 13 640 Ships in 10 - 15 working days

A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.
This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world.
* Examines in detail the default and custom installation of Microsoft's Virtual Server 2005
* Addresses th important topics of server requirements and the cost implications involved
* Looks at addressing IT costs and the benefits to the organisation

Mathematical Theory of Advanced Computing (Hardcover, 2020 ed.): Wolfgang W. Osterhage Mathematical Theory of Advanced Computing (Hardcover, 2020 ed.)
Wolfgang W. Osterhage
R665 Discovery Miles 6 650 Ships in 18 - 22 working days

This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlapping non-interfering (virtual) address spaces. This approach is based on a newly developed jump transformation between different symbol spaces. Another approach deals with efficiency and accuracy in scientific calculations. Finally the concept of a Neural Relational Data Base Management System is introduced and the performance potential of quantum computers assessed.

Cybercrime Case Presentation - An Excerpt from Placing The Suspect Behind The Keyboard (Paperback, Abridged edition): Brett... Cybercrime Case Presentation - An Excerpt from Placing The Suspect Behind The Keyboard (Paperback, Abridged edition)
Brett Shavers
R591 Discovery Miles 5 910 Ships in 18 - 22 working days

"Cybercrime Case Presentation "is a "first look" excerpt from Brett Shavers' new Syngress book, "Placing the Suspect Behind the Keyboard. "Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they observed the case as it happened.

Investigating Windows Systems (Paperback): Harlan Carvey Investigating Windows Systems (Paperback)
Harlan Carvey
R1,450 Discovery Miles 14 500 Ships in 10 - 15 working days

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.

Automotive Cyber Security - Introduction, Challenges, and Standardization (Hardcover, 1st ed. 2020): Shiho Kim, Rakesh Shrestha Automotive Cyber Security - Introduction, Challenges, and Standardization (Hardcover, 1st ed. 2020)
Shiho Kim, Rakesh Shrestha
R3,989 Discovery Miles 39 890 Ships in 10 - 15 working days

This book outlines the development of safety and cybersecurity, threats and activities in automotive vehicles. This book discusses the automotive vehicle applications and technological aspects considering its cybersecurity issues. Each chapter offers a suitable context for understanding the complexities of the connectivity and cybersecurity of intelligent and autonomous vehicles. A top-down strategy was adopted to introduce the vehicles' intelligent features and functionality. The area of vehicle-to-everything (V2X) communications aims to exploit the power of ubiquitous connectivity for the traffic safety and transport efficiency. The chapters discuss in detail about the different levels of autonomous vehicles, different types of cybersecurity issues, future trends and challenges in autonomous vehicles. Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks. The book thus provides important information on the cybersecurity challenges faced by the autonomous vehicles and it seeks to address the mobility requirements of users, comfort, safety and security. This book aims to provide an outline of most aspects of cybersecurity in intelligent and autonomous vehicles. It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity. In particular, this book helps people who need to make better decisions about automotive security and safety approaches. Moreover, it is beneficial to people who are involved in research and development in this exciting area. As seen from the table of contents, automotive security covers a wide variety of topics. In addition to being distributed through various technological fields, automotive cybersecurity is a recent and rapidly moving field, such that the selection of topics in this book is regarded as tentative solutions rather than a final word on what exactly constitutes automotive security. All of the authors have worked for many years in the area of embedded security and for a few years in the field of different aspects of automotive safety and security, both from a research and industry point of view.

Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 2 (Hardcover, 1st... Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 2 (Hardcover, 1st ed. 2016)
Daya K. Lobiyal, Durga Prasad Mohapatra, Atulya Nagar, Manmath N. Sahoo
R6,271 Discovery Miles 62 710 Ships in 18 - 22 working days

The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

Cybersecurity for Business - Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue (Hardcover): Larry... Cybersecurity for Business - Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue (Hardcover)
Larry Clinton
R3,062 Discovery Miles 30 620 Ships in 18 - 22 working days

Balance the benefits of digital transformation with the associated risks with this guide to effectively managing cybersecurity as a strategic business issue. Important and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate reputation and consumer confidence. Over the past several years, organizations around the world have increasingly come to appreciate the need to address cybersecurity issues from a business perspective, not just from a technical or risk angle. Cybersecurity for Business builds on a set of principles developed with international leaders from technology, government and the boardroom to lay out a clear roadmap of how to meet goals without creating undue cyber risk. This essential guide outlines the true nature of modern cyber risk, and how it can be assessed and managed using modern analytical tools to put cybersecurity in business terms. It then describes the roles and responsibilities each part of the organization has in implementing an effective enterprise-wide cyber risk management program, covering critical issues such as incident response, supply chain management and creating a culture of security. Bringing together a range of experts and senior leaders, this edited collection enables leaders and students to understand how to manage digital transformation and cybersecurity from a business perspective.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
What's My Password? - An Easy Password…
Protect Your Privacy Press Paperback R197 Discovery Miles 1 970
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R3,116 Discovery Miles 31 160
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470

 

Partners