0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (245)
  • R250 - R500 (555)
  • R500+ (5,228)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Secure Data Management for Online Learning Applications (Hardcover): L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo... Secure Data Management for Online Learning Applications (Hardcover)
L. Jegatha Deborah, P Vijayakumar, Brij B. Gupta, Danilo Pelusi
R3,488 Discovery Miles 34 880 Ships in 12 - 17 working days

Simplicity and Uniqueness Structure of the book content Simple English and Ease of Undersatanding Exhaustive research in the content of the book

PCI DSS: A Pocket Guide (Paperback, 5th Revised edition): IT Governance Institute PCI DSS: A Pocket Guide (Paperback, 5th Revised edition)
IT Governance Institute
R411 Discovery Miles 4 110 Ships in 10 - 15 working days

Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.2, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation involved with payment card processing.

Information Fusion in Distributed Sensor Networks with Byzantines (Hardcover, 1st ed. 2021): Andrea Abrardo, Mauro Barni,... Information Fusion in Distributed Sensor Networks with Byzantines (Hardcover, 1st ed. 2021)
Andrea Abrardo, Mauro Barni, Kassem Kallas, Benedetta Tondi
R3,797 Discovery Miles 37 970 Ships in 10 - 15 working days

This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory.

Technology for Success - Computer Concepts (Paperback, New edition): Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell,... Technology for Success - Computer Concepts (Paperback, New edition)
Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell, Mark Frydenberg, … 1
R1,273 R1,185 Discovery Miles 11 850 Save R88 (7%) Ships in 10 - 15 working days

Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.

AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover): Balwinder Raj, Brij B. Gupta, Shingo... AI for Big Data Based Engineering Applications from the Security Perspectives (Hardcover)
Balwinder Raj, Brij B. Gupta, Shingo Yamaguchi, Sandeep Singh Gill
R3,795 Discovery Miles 37 950 Ships in 12 - 17 working days

i. This book will contain AI, ML, DL, big data and security never before considered ii. Innovative artificial intelligence techniques and algorithms iii. Only emerging from recent research and development, e.g. AI for big data from security perspective, which are not covered in any existing texts iv. Artificial Intelligence for big data and security Applications with advanced features v. Key new finding of machine learning and deep learning for Security Applications

The CISO's Next Frontier - AI, Post-Quantum Cryptography and Advanced Security Paradigms (Hardcover, 1st ed. 2021): Raj... The CISO's Next Frontier - AI, Post-Quantum Cryptography and Advanced Security Paradigms (Hardcover, 1st ed. 2021)
Raj Badhwar
R2,069 Discovery Miles 20 690 Ships in 12 - 17 working days

This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing, mitigating or remediating those threats and risks. Cyber security technologies discussed in this book are futuristic and current. Advanced security topics such as secure remote work, data security, network security, application and device security, cloud security, and cyber risk and privacy are presented in this book. At the end of every chapter, an evaluation of the topic from a CISO's perspective is provided. This book also addresses quantum computing, artificial intelligence and machine learning for cyber security The opening chapters describe the power and danger of quantum computing, proposing two solutions for protection from probable quantum computer attacks: the tactical enhancement of existing algorithms to make them quantum-resistant, and the strategic implementation of quantum-safe algorithms and cryptosystems. The following chapters make the case for using supervised and unsupervised AI/ML to develop predictive, prescriptive, cognitive and auto-reactive threat detection, mitigation, and remediation capabilities against advanced attacks perpetrated by sophisticated threat actors, APT and polymorphic/metamorphic malware. CISOs must be concerned about current on-going sophisticated cyber-attacks, and can address them with advanced security measures. The latter half of this book discusses some current sophisticated cyber-attacks and available protective measures enabled by the advancement of cybersecurity capabilities in various IT domains. Chapters 6-10 discuss secure remote work; chapters 11-17, advanced data security paradigms; chapters 18-28, Network Security; chapters 29-35, application and device security; chapters 36-39, Cloud security; and chapters 40-46 organizational cyber risk measurement and event probability. Security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs will want to purchase this book. Risk personnel, CROs, IT and Security Auditors as well as security researchers and journalists will also find this useful.

Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy (Hardcover): Philip Alexander Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy (Hardcover)
Philip Alexander
R2,325 Discovery Miles 23 250 Ships in 10 - 15 working days

In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions of various kinds. Many people, especially nonprofessional administrators of home or small business networks, feel helpless. In this book, technical security expert Philip Alexander explains in layman's terms how to keep networks and individual computers safe from the bad guys. In presenting solutions to these problems and many others, the book is a lifeline to those who know their computer systems are vulnerable to smart thieves and hackers-not to mention tech-savvy kids or employees who are swapping music files, stealing software, or otherwise making a mockery of the word security. In his job protecting data and combating financial fraud, Philip Alexander knows well which power tools are required to keep hackers and thieves at bay. With his gift for putting technical solutions in everyday language, Alexander helps readers with home and/or small business networks protect their data, their identities, and their privacy using the latest techniques. In addition, readers will learn how to protect PDAs and smartphones, how to make hardware thefts more unlikely, how to sniff out scammers and the motives of offshore tech support personnel who ask too many questions, and how to keep personal information safer when shopping over the Internet or telephone. The emphasis throughout the book is on managing security-putting protections and policies in place that will make it far less likely that readers become victims. What's more, the book isn't just about the dangers of technical ignorance: It is designed to show readers how to get the most from their systems, how the latest software can increase productivity, how to solve knotty computer problems without getting tied into knots yourself, and when to call in the pros. This book does more than provide solutions-it provides peace of mind.

Official (ISC)2 (R) Guide to the CISSP (R)-ISSMP (R) CBK (R) (Hardcover, 2nd edition): Joseph Steinberg Official (ISC)2 (R) Guide to the CISSP (R)-ISSMP (R) CBK (R) (Hardcover, 2nd edition)
Joseph Steinberg
R2,381 Discovery Miles 23 810 Ships in 9 - 15 working days

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture. Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC)2(r) Guide to the ISSAP(r) CBK(r), Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations. Newly Enhanced Design This Guide Has It All Only guide endorsed by (ISC)2 Most up-to-date CISSP-ISSAP CBK Evolving terminology and changing requirements for security professionals Practical examples that illustrate how to apply concepts in real-life situations Chapter outlines and objectives Review questions and answers References to free study resources Read It. Study It. Refer to It Often. Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.

Data Spaces - Design, Deployment and Future Directions (Hardcover, 1st ed. 2022): Edward Curry, Simon Scerri, Tuomo Tuikka Data Spaces - Design, Deployment and Future Directions (Hardcover, 1st ed. 2022)
Edward Curry, Simon Scerri, Tuomo Tuikka
R1,713 Discovery Miles 17 130 Ships in 12 - 17 working days

This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces. The book captures the early lessons and experience in creating data spaces. It arranges these contributions into three parts covering design, deployment, and future directions respectively. The first part explores the design space of data spaces. The single chapters detail the organisational design for data spaces, data platforms, data governance federated learning, personal data sharing, data marketplaces, and hybrid artificial intelligence for data spaces. The second part describes the use of data spaces within real-world deployments. Its chapters are co-authored with industry experts and include case studies of data spaces in sectors including industry 4.0, food safety, FinTech, health care, and energy. The third and final part details future directions for data spaces, including challenges and opportunities for common European data spaces and privacy-preserving techniques for trustworthy data sharing. The book is of interest to two primary audiences: first, researchers interested in data management and data sharing, and second, practitioners and industry experts engaged in data-driven systems where the sharing and exchange of data within an ecosystem are critical.

Application Security in the ISO 27001 - 2013 Environment (Paperback, 2nd Two ed.): Vinod Vasudevan Application Security in the ISO 27001 - 2013 Environment (Paperback, 2nd Two ed.)
Vinod Vasudevan
R1,153 Discovery Miles 11 530 Ships in 12 - 17 working days
Transformations Through Blockchain Technology - The New Digital Revolution (Hardcover, 1st ed. 2022): Sheikh Mohammad Idrees,... Transformations Through Blockchain Technology - The New Digital Revolution (Hardcover, 1st ed. 2022)
Sheikh Mohammad Idrees, Mariusz Nowostawski
R3,637 Discovery Miles 36 370 Ships in 12 - 17 working days

The book serves as a connecting medium between various domains and Blockchain technology, discussing and embracing how Blockchain technology is transforming all the major sectors of the society. The book facilitates sharing of information, case studies, theoretical and practical knowledge required for Blockchain transformations in various sectors. The book covers different areas that provide the foundational knowledge and comprehensive information about the transformations by Blockchain technology in the fields of business, healthcare, finance, education, supply-chain, sustainability and governance. The book pertains to students, academics, researchers, professionals, and policy makers working in the area of Blockchain technology and related fields.

Recent Trends in Communication, Computing, and Electronics - Select Proceedings of IC3E 2018 (Hardcover, 1st ed. 2019): Ashish... Recent Trends in Communication, Computing, and Electronics - Select Proceedings of IC3E 2018 (Hardcover, 1st ed. 2019)
Ashish Khare, Uma Shankar Tiwary, Ishwar K. Sethi, Nar Singh
R6,000 Discovery Miles 60 000 Ships in 10 - 15 working days

This book presents select papers from the International Conference on Emerging Trends in Communication, Computing and Electronics (IC3E 2018). Covering the latest theories and methods in three related fields - electronics, communication and computing, it describes cutting-edge methods and applications in the areas of signal and image processing, cyber security, human-computer interaction, machine learning, electronic devices, nano-electronics, wireless sensor networks, antenna and wave propagation, and mobile communication. The contents of this book will be beneficial to students, researchers, and professionals working in the field of networks and communications.

Advances in Cyber Security: Principles, Techniques, and Applications (Hardcover, 1st ed. 2019): Kuan-Ching Li, Xiaofeng Chen,... Advances in Cyber Security: Principles, Techniques, and Applications (Hardcover, 1st ed. 2019)
Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
R4,858 Discovery Miles 48 580 Ships in 10 - 15 working days

This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes. Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.

Responsible Graph Neural Networks (Hardcover): Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash Responsible Graph Neural Networks (Hardcover)
Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash
R2,633 Discovery Miles 26 330 Ships in 12 - 17 working days

More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

Responsible Graph Neural Networks (Paperback): Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash Responsible Graph Neural Networks (Paperback)
Nour Moustafa, Mohamed Abdel-Basset, Zahir Tari, Hossam Hawash
R1,530 Discovery Miles 15 300 Ships in 12 - 17 working days

More frequent and complex cyber threats require robust, automated and rapid responses from cyber security specialists. This book offers a complete study in the area of graph learning in cyber, emphasising graph neural networks (GNNs) and their cyber security applications. Three parts examine the basics; methods and practices; and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber security applications. Part two explains three different categories of graph learning including deterministic, generative and reinforcement learning and how they can be used for developing cyber defence models. The discussion of each category covers the applicability of simple and complex graphs, scalability, representative algorithms and technical details. Undergraduate students, graduate students, researchers, cyber analysts, and AI engineers looking to understand practical deep learning methods will find this book an invaluable resource.

Bootstrapped Millionaire - Defying the Odds of Business (Hardcover): Tim T Mercer Bootstrapped Millionaire - Defying the Odds of Business (Hardcover)
Tim T Mercer
R789 R696 Discovery Miles 6 960 Save R93 (12%) Ships in 10 - 15 working days
The Tao of Open Source Intelligence (Paperback): Stewart K. Bertram The Tao of Open Source Intelligence (Paperback)
Stewart K. Bertram; Edited by It Governance Publishing
R1,145 Discovery Miles 11 450 Ships in 12 - 17 working days

The Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms such as those associated with social media has confirmed its dominance as the main information exchange platform for the foreseeable future. But how do you conduct an online investigation when so much of the Internet isn't even indexed by search engines? Accessing and using the information that's freely available online is about more than just relying on the first page of Google results. Open source intelligence (OSINT) is intelligence gathered from publically available sources and is the key to unlocking this domain for the purposes of investigation. Product overview The Tao of Open Source Intelligence provides a comprehensive guide to OSINT techniques, for the investigator: It catalogues and explains the tools and investigative approaches that are required when conducting research within the surface, deep and dark webs. It explains how to scrutinise criminal activity without compromising your anonymity - and your investigation. It examines the relevance of cyber geography and how to get around its limitations. It describes useful add-ons for common search engines, as well as considering metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz and Carrot2) that collate search data from single-source intelligence platforms such as Google. It considers deep-web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, entity extraction tools and specialist search syntax (Google kung fu). It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices and debunking myths about online privacy. OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community. The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability. About the author Stewart K. Bertram is a career intelligence analyst who has spent over a decade working across the fields of counterterrorism, cyber security, corporate investigations and geopolitical analysis. The holder of a master's degree in computing and a master of letters in terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience, having used open source intelligence on such diverse real-world topics as the terrorist use of social media in Sub-Saharan Africa and threat assessment at the London Olympic Games. Stewart teaches courses on open source intelligence as well as practising what he preaches in his role as a cyber threat intelligence manager for some of the world's leading private-sector intelligence and security agencies.

Privacy and Data Protection in Software Services (Hardcover, 1st ed. 2022): Roberto Senigaglia, Claudia Irti, Alessandro Bernes Privacy and Data Protection in Software Services (Hardcover, 1st ed. 2022)
Roberto Senigaglia, Claudia Irti, Alessandro Bernes
R5,021 Discovery Miles 50 210 Ships in 12 - 17 working days

The aim of the book is to create a bridge between two 'lands' that are usually kept separate: technical tools and legal rules should be bound together for moulding a special 'toolbox' to solve present and future issues. The volume is intended to contribute to this 'toolbox' in the area of software services, while addressing how to make legal studies work closely with engineers' and computer scientists' fields of expertise, who are increasingly involved in tangled choices on daily programming and software development. In this respect, law has not lost its importance and its own categories in the digital world, but as well as any social science needs to experience a new realistic approach amid technological development and individuals' fundamental rights and freedoms.

PKI Implementation and Infrastructures (Hardcover): Julian Ashbourn PKI Implementation and Infrastructures (Hardcover)
Julian Ashbourn
R3,320 Discovery Miles 33 200 Ships in 12 - 17 working days

1. It is a practical guide to understanding and implementation 2. It assumes no prior in depth knowledge 3. It is written in plain language and may be understood by anyone, whether or not they are qualified or involved with IT. It is therefore equally suitable for senior management, IT practitioners, students and interested individuals.

Build a Security Culture (Paperback): Kai Roer Build a Security Culture (Paperback)
Kai Roer; Edited by It Governance Publishing
R613 Discovery Miles 6 130 Ships in 12 - 17 working days

Protect your organisation by building a security-minded culture "With this book, Kai Roer has taken his many years of cyber experience and provided those with a vested interest in cyber security a firm basis on which to build an effective cyber security training programme." Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Washington, D.C. Human nature - easy prey for hackers? Human behaviour is complex and inconsistent, making it a rich hunting ground for would-be hackers and a significant risk to the security of your organisation . An effective way to address this risk is to create a culture of security. Using the psychology of group behaviour and explaining how and why people follow social and cultural norms, the author highlights the underlying cause for many successful and easily preventable attacks. An effective framework for behavioural security In this book Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour . He explains how to manage these threats by implementing an effective framework for an organisational culture, ensuring that your organisation is set up to repel malicious intrusions and threats based on common human vulnerabilities. Contents What is security culture? The Elements of security culture How does security culture relate to security awareness? Asking for help raises your chances of success The psychology of groups and how to use it to your benefit Measuring culture Building security culture About the author Kai Roer is a management and security consultant and trainer with extensive international experience from more than 30 countries around the world. He is a guest lecturer at several universities, and the founder of The Roer Group, a European management consulting group focusing on security culture. Kai has authored a number of books on leadership and cyber security , has been published extensively in print and online, has appeared on radio and television, and has featured in printed media. He is a columnist at Help Net Security and has been the Cloud Security Alliance Norway chapter president since 2012. Kai is a passionate public speaker who engages his audience with his entertaining style and deep knowledge of human behaviours , psychology and cyber security . He is a Fellow of the National Cybersecurity Institute and runs a blog on information security and culture (roer.com). Kai is the host of Security Culture TV, a monthly video and podcast. Series information Build a Security Culture is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.

Algorithms and Applications - ALAP 2018 (Hardcover, 1st ed. 2018): Sajal K. Das, Nabendu Chaki Algorithms and Applications - ALAP 2018 (Hardcover, 1st ed. 2018)
Sajal K. Das, Nabendu Chaki
R5,349 Discovery Miles 53 490 Ships in 10 - 15 working days

This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design. The book provides solutions to a broad class of problems in diverse areas of algorithms in our daily lives in a world designed for, and increasingly controlled by algorithms. Written by eminent personalities from academia and industry, the papers included offer insights from a number of perspectives, providing an overview of the state of the art in the field. The book consists of invited talks by respected speakers, papers presented in technical sessions, and tutorials to offer ideas, results, work-in-progress and experiences of various algorithmic aspects of computational science and engineering.

ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September... ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings (Hardcover, 1st ed. 2020)
Marko Hoelbl, Kai Rannenberg, Tatjana Welzer
R3,621 Discovery Miles 36 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 35th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2020, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 29 full papers presented were carefully reviewed and selected from 149 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on channel attacks; connection security; human aspects of security and privacy; detecting malware and software weaknesses; system security; network security and privacy; access control and authentication; crypto currencies; privacy and security management; and machine learning and security.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Hardcover): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Hardcover)
Alan Tang
R3,224 Discovery Miles 32 240 Ships in 12 - 17 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023): Tuomo Sipola, Tero Kokkonen,... Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023)
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
R4,869 Discovery Miles 48 690 Ships in 10 - 15 working days

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.

Introductory Computer Forensics - A Hands-on Practical Approach (Hardcover, 1st ed. 2018): Xiaodong Lin Introductory Computer Forensics - A Hands-on Practical Approach (Hardcover, 1st ed. 2018)
Xiaodong Lin
R3,405 Discovery Miles 34 050 Ships in 10 - 15 working days

This textbook provides an introduction to digital forensics, a rapidly evolving field for solving crimes. Beginning with the basic concepts of computer forensics, each of the book's 21 chapters focuses on a particular forensic topic composed of two parts: background knowledge and hands-on experience through practice exercises. Each theoretical or background section concludes with a series of review questions, which are prepared to test students' understanding of the materials, while the practice exercises are intended to afford students the opportunity to apply the concepts introduced in the section on background knowledge. This experience-oriented textbook is meant to assist students in gaining a better understanding of digital forensics through hands-on practice in collecting and preserving digital evidence by completing various exercises. With 20 student-directed, inquiry-based practice exercises, students will better understand digital forensic concepts and learn digital forensic investigation techniques. This textbook is intended for upper undergraduate and graduate-level students who are taking digital-forensic related courses or working in digital forensics research. It can also be used by digital forensics practitioners, IT security analysts, and security engineers working in the IT security industry, particular IT professionals responsible for digital investigation and incident handling or researchers working in these related fields as a reference book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
PCI Dss: A Pocket Guide
IT Governance Paperback R425 Discovery Miles 4 250
Artificial Intelligence-based…
Jordi Guijarro, Saber Mhiri, … Hardcover R3,011 Discovery Miles 30 110
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R1,083 R933 Discovery Miles 9 330
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,290 Discovery Miles 12 900
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,097 R935 Discovery Miles 9 350
Two-Factor Authentication
Mark Stanislav Paperback R543 Discovery Miles 5 430
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,242 Discovery Miles 12 420
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,848 Discovery Miles 88 480
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R695 Discovery Miles 6 950
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,388 Discovery Miles 13 880

 

Partners