0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (589)
  • R500+ (5,151)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Hardcover): Maurice Dawson, Dakshina Ranjan... Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Hardcover)
Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
R5,339 Discovery Miles 53 390 Ships in 18 - 22 working days

In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments and organizations to steel themselves against these threats in innovative ways. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.

Cyber Security for Cyber Physical Systems (Hardcover, 1st ed. 2018): Saqib Ali, Taiseera Al Balushi, Zia Nadir, Omar Khadeer... Cyber Security for Cyber Physical Systems (Hardcover, 1st ed. 2018)
Saqib Ali, Taiseera Al Balushi, Zia Nadir, Omar Khadeer Hussain
R5,225 Discovery Miles 52 250 Ships in 10 - 15 working days

This book is a pioneering yet primary general reference resource on cyber physical systems and their security concerns. Providing a fundamental theoretical background, and a clear and comprehensive overview of security issues in the domain of cyber physical systems, it is useful for students in the fields of information technology, computer science, or computer engineering where this topic is a substantial emerging area of study.

Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover): Chinmay Chakraborty, Sree Ranjani... Security of Internet of Things Nodes - Challenges, Attacks, and Countermeasures (Hardcover)
Chinmay Chakraborty, Sree Ranjani Rajendran, Muhammad Habibur Rehman
R4,510 Discovery Miles 45 100 Ships in 10 - 15 working days

The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures (R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things. It also covers various algorithms, techniques, and schemes in the field of computer science with state-of-the-art tools and technologies. This book mainly focuses on the security challenges of the Internet of Things devices and the countermeasures to overcome security vulnerabilities. Also, it highlights trust management issues on the Internet of Things nodes to build secured Internet of Things systems. The book also covers the necessity of a system model for the Internet of Things devices to ensure security at the hardware level.

Information Security Management - Concepts and Practice (Hardcover, 3rd Edition): Bel G. Raggad Information Security Management - Concepts and Practice (Hardcover, 3rd Edition)
Bel G. Raggad
R3,173 Discovery Miles 31 730 Ships in 10 - 15 working days

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs.

An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.

This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment—including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.

Table of Contents

INTRODUCTION

Introduction to Information Security Management

Why Information Security Matters

Information Sensitivity Classification

Information Security Governance

The Computing Environment

Security of Various Components in the Computing

Environment

Security Interdependence

CIA Triad

Security Goals versus Business Goals

The Security Star

Parker’s View of Information Security

What Is Information Security Management?

Defense-In-Depth Security

Security Controls

The NSA Triad for Security Assessment

Introduction to Management Concepts

Brief History of Management

Traditional Management Skills and Security Literacy

Managerial Skills

Redefining Mintzberg’s Managerial Roles

Strategic Management Concepts

IS Security Management Activities

Do We Really Need an Independent Information Security Functional Unit?

The Information Security Management Cycle

IS Security Management versus Functional Management

The Information Security Life Cycle

Security Planning in the SLC

Security Analysis

Security Design

Security Implementation

Security Review

Continual Security

SECURITY PLAN

Security Plan

SP Development Guidelines

SP Methodology

Security Policy

Security Policy, Standards, and Guidelines

Security Policy Methodologies

Business Continuity Planning

Business Disruptions

Business Continuity

Disaster Recovery

Responding to Business Disruptions

Developing a BCP

SECURITY ANALYSIS

Security Risk Management

The Risk Management Life Cycle

The Preparation Effort for Risk Management

A Sustainable Security Culture

Information Needed to Manage Risks

Factors Affecting Security Risk

The ALE Risk Methodology

Operational, Functional, and Strategic Risks

Operational Risk Management: Case of the Naval Safety Center

The ABLE Methodology

Continual Security: Integrated Fault-Event Analysis and Response Framework (IFEAR)

IFEAR Methodology

Fault Tree Analysis

Event Tree Analysis

FTA-ETA Integration

Risk Management

|Simulation and Sensitivity Analysis

Active Security Assessment

Standards for Active Security Assessment

Limits of Active Security Assessment

Can You Hack Your Own System?

Ethical Hacking of a Computing Environment

Ethics in Ethical Hacking

ASA through Penetration Testing

Strategies for Active Security Assessment

Guidelines and Terms between Testers and the Organization

The Active Security Assessment Project

System Availability

Computer Clustering

Review of Cluster Concepts

Types of Clusters

Web Site Availability

Application Centers No Longer the Only Sound Implementation

Computation of Availability in High-Availability Cluster

Related Availability Definitions

How to Obtain Higher Availability: The Cisco Process Nines’ Availability

Common Configurations for Clusters

Self-Healing and Availability

SECURITY DESIGN

Nominal Security Enhancement Design Based on ISO/IEC 27002

History of the ISO/IEC 27002

ISO/IEC 27002

How to Use the ISO/IEC 27002 to Enhance Security

Measurement and Implementations

Strategies to Enhance the ISO/IEC 27002-Based Security Posture

Comparing the ISO/IEC 27002-Based Security Posture Enhancement Strategies

Technical Security Enhancement Based on ISO/IEC 27001

How Organizations Interact with the Standards

General ISMS Framework

The ISMS Model

The Process Approach Ensures the Continual Improvement of the ISMS

Development of the Information Security Management System

Design of the ISMS

Security Inventory Needs

The Integration of ISMS Subsystems

Self-Assessment for Compliance

Revisiting ISMS Scoping

SECURITY IMPLEMENTATION

Security Solutions

Security Solutions

The NIST Security Solution Taxonomy

The ISO Security Solution Taxonomy

The Common Criteria

The Birth of the Common Criteria

Common Uses of the CC

The CC Document

The CC Security Approach

Information Resource Evaluation Methodology

CC Security Evaluation Programs

The American Model of CC Evaluation Programs

A National Model

Some Other CC Evaluation Requirements

Minicase

SECURITY REVIEW

Security Review through Security Audit

Security Audit Means Different Things to Different People

Some Security Audit Activities

Our Definition of Security Audit

Main Features in Security Audit

Application Audit

How Does Security Audit Relate to the Corporate Security Policy?

Structure of a Security Audit

Security Audit versus IT Auditing

Applicable Security-Related Standards

Security Audit Grades

Privacy Rights, Information Technology, and HIPAA

The Problem of Privacy

The Meaning of Privacy

HIPAA

Regulatory Standards: The Privacy Rule

The HIPAA Security Rule

Administrative Safeguards

NIST on HIPAA

Conducting Effective Risk Analysis

CONTINUAL SECURITY

The Sarbanes–Oxley Act and IT Compliance

Methods of Doing Business

Background of the SarbanesOxley Act

SarbanesOxley Act of 2002

Major Provisions of SO

Management Assessment of Internal Controls and IT

Compliance

IT Compliance

International Responses

Advantages to SOX Compliance

Foreign Whistleblowers and SOX

Reconciling SOX and European Conflicting Standards

EU Corporate Governance Initiatives

E.U.’s Eighth Directive

Planning IT Management for SOX: Delayed SOX Impact

Cyberterrorism and Homeland Security

Security Economic Intelligence

Homeland Security

Cyberterrorism in the Literature

Cyberterrorism in the Real World: The FBI Perspective

U.S. Legislative Enactments and Proposed Programs

U.S. Criminal Statutes Affecting the Internet

Statutes and Executive Orders Concerned with Cyberterrorism

International Initiatives

Individual European State Approaches to Security and Counterterrorism

Other International Efforts

Index

Each chapter begins with an Introduction and concludes with a Summary, Review Questions, Workshops, and References

Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016): Mohammad A. Tayebi,... Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016)
Mohammad A. Tayebi, Uwe Glasser
R3,286 R2,916 Discovery Miles 29 160 Save R370 (11%) Ships in 10 - 15 working days

This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.

Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover): Jack M Wedam Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover)
Jack M Wedam
R702 Discovery Miles 7 020 Ships in 10 - 15 working days
Blockchain Technology in Internet of Things (Hardcover, 1st ed. 2019): Liehuang Zhu, Keke Gai, Meng Li Blockchain Technology in Internet of Things (Hardcover, 1st ed. 2019)
Liehuang Zhu, Keke Gai, Meng Li
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.

Safety, Security and Privacy for Cyber-Physical Systems (Hardcover, 1st ed. 2021): Riccardo M.G. Ferrari, Andre M. H. Teixeira Safety, Security and Privacy for Cyber-Physical Systems (Hardcover, 1st ed. 2021)
Riccardo M.G. Ferrari, Andre M. H. Teixeira
R4,294 Discovery Miles 42 940 Ships in 18 - 22 working days

This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.

Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 1 (Hardcover, 1st... Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 1 (Hardcover, 1st ed. 2017)
Daya K. Lobiyal, Durga Prasad Mohapatra, Atulya Nagar, Manmath N. Sahoo
R6,282 Discovery Miles 62 820 Ships in 18 - 22 working days

The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

Emerging Topics in Hardware Security (Hardcover, 1st ed. 2021): Mark Tehranipoor Emerging Topics in Hardware Security (Hardcover, 1st ed. 2021)
Mark Tehranipoor
R2,997 Discovery Miles 29 970 Ships in 18 - 22 working days

This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware design, and hardware security and trust. Readers will gain a comprehensive understanding of hardware security problems and how to overcome them through an efficient combination of conventional approaches and emerging technologies, enabling them to design secure, reliable, and trustworthy hardware.

Cyber Threat Intelligence for the Internet of Things (Hardcover, 1st ed. 2020): Elias Bou-Harb, Nataliia Neshenko Cyber Threat Intelligence for the Internet of Things (Hardcover, 1st ed. 2020)
Elias Bou-Harb, Nataliia Neshenko
R3,984 Discovery Miles 39 840 Ships in 10 - 15 working days

This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as "the Internet of Things" (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.

Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023): Tuomo Sipola, Tero Kokkonen,... Artificial Intelligence and Cybersecurity - Theory and Applications (Hardcover, 1st ed. 2023)
Tuomo Sipola, Tero Kokkonen, Mika Karjalainen
R4,271 Discovery Miles 42 710 Ships in 18 - 22 working days

This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The chapters are contributed by an international team of renown researchers and professionals in the field of AI and cybersecurity. During the last few decades the rise of modern AI solutions that surpass humans in specific tasks has occurred. Moreover, these new technologies provide new methods of automating cybersecurity tasks. In addition to the privacy, ethics and cybersecurity concerns, the readers learn several new cutting edge applications of AI technologies. Researchers working in AI and cybersecurity as well as advanced level students studying computer science and electrical engineering with a focus on AI and Cybersecurity will find this book useful as a reference. Professionals working within these related fields will also want to purchase this book as a reference.

Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Hardcover, 1st ed. 2021): Jennifer S.... Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Hardcover, 1st ed. 2021)
Jennifer S. Raj, Abdullah M. Iliyasu, Robert Bestak, Zubair A. Baig
R8,256 Discovery Miles 82 560 Ships in 10 - 15 working days

This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.

Network Security (Hardcover): Perez Network Security (Hardcover)
Perez
R3,776 Discovery Miles 37 760 Ships in 18 - 22 working days

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

Hardware Security - A Hands-on Learning Approach (Paperback): Swarup Bhunia, Mark Tehranipoor Hardware Security - A Hands-on Learning Approach (Paperback)
Swarup Bhunia, Mark Tehranipoor
R2,213 R2,094 Discovery Miles 20 940 Save R119 (5%) Ships in 10 - 15 working days

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.

Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 2 (Hardcover, 1st... Proceedings of the International Conference on Signal, Networks, Computing, and Systems - ICSNCS 2016, Volume 2 (Hardcover, 1st ed. 2016)
Daya K. Lobiyal, Durga Prasad Mohapatra, Atulya Nagar, Manmath N. Sahoo
R6,271 Discovery Miles 62 710 Ships in 18 - 22 working days

The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25-27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

Virtualization with Microsoft Virtual Server 2005 (Paperback): Andy Jones, Rogier Dittner, David Rule, Ken Majors, Aaron... Virtualization with Microsoft Virtual Server 2005 (Paperback)
Andy Jones, Rogier Dittner, David Rule, Ken Majors, Aaron Tiensivu, …
R1,364 Discovery Miles 13 640 Ships in 10 - 15 working days

A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.
This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how Virtual Server can ease administration and lower overall IT costs. Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual world.
* Examines in detail the default and custom installation of Microsoft's Virtual Server 2005
* Addresses th important topics of server requirements and the cost implications involved
* Looks at addressing IT costs and the benefits to the organisation

(R)evolution - Security Challenges Past and Present (Hardcover): Neil Kent (R)evolution - Security Challenges Past and Present (Hardcover)
Neil Kent; Irina du Quenoy
R4,661 Discovery Miles 46 610 Ships in 18 - 22 working days

This collection of essays comprises a series of think-pieces about the security challenges of the present, both in the realm of cyberspace and otherwise, with a particular consideration of the promise and possible negative effects of new digital technologies. French military academy instructor Gerard de Boisboissel considers the contemporary digital transformation of his country's military and proposes ways to ensure its maximum effectiveness. Retired American senior intelligence officer Leslie Gruis takes the long historical view, examining parallels between the effects of the current technological revolution and the transformation wrought by the invention of the printing press. Columbia University research scholar Michael Klipstein and coauthor Peter Chuzie analyze the potential offered for intelligence collection by the Internet of Things. And British academic Craig Stanley-Adamson explores the lessons that may be drawn from the relationship between Israel and its neighbors in the first decade post 9/11, arguing that it was characterized by a surprising degree of cooperation in the security realm that may, given auspicious circumstances, be repeated in the future.

Exploring Careers in Cybersecurity and Digital Forensics (Hardcover): Lucy K. Tsado, Robert Osgood Exploring Careers in Cybersecurity and Digital Forensics (Hardcover)
Lucy K. Tsado, Robert Osgood
R1,103 Discovery Miles 11 030 Ships in 18 - 22 working days

Cybersecurity is a fairly new academic discipline. Therefore, most of the books written are mainly focused on classroom material and resources. To the best of our knowledge, there isn't a book that targets criminal justice and other nontechnical students from a career choice standpoint, while also providing needed guidance for a career in the field. Exploring Careers in Cybersecurity and Digital Forensics will guide students in understanding the unique opportunity that a career in digital forensics and cybersecurity provides, and a plan for how to navigate the vast amount of resources like formal education, digital forensics/cybersecurity certifications and other career building tools available. While the cybersecurity field and profession are fully aware of the skills gap and the opportunities that are available, other nontraditional students are not. Human behavioral disciplines like criminal justice, psychology, law and some other disciplines like business, engineering and political science are not aware that their skills are also relevant and lacking in the digital forensics/cybersecurity field. This book will draw awareness and attract the attention of those nontechnical students and professionals that would not typically be involved in cybersecurity education. Moreover, with the continued rise in cyberattacks, the need for technological and non-technological skills in responding to digital behavior that is criminal, as well as the requirement to respond, investigate, gather and preserve evidence is growing. Careers in Cybersecurity, Cyber Defense and Digital Forensics will therefore be a useful tool for both students and those who are in the position in helping them make career decisions. Counselors and school administrators in both high school and undergraduate programs will benefit from the information in this book.

Securing Government Information and Data in Developing Countries (Hardcover): Saleem Zoughbi Securing Government Information and Data in Developing Countries (Hardcover)
Saleem Zoughbi
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.

Chaotic Secure Communication - Principles and Technologies (Hardcover): Kehui Sun Chaotic Secure Communication - Principles and Technologies (Hardcover)
Kehui Sun; Contributions by Tsinghua University Press
R3,653 Discovery Miles 36 530 Ships in 10 - 15 working days

The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.

Mathematical Theory of Advanced Computing (Hardcover, 2020 ed.): Wolfgang W. Osterhage Mathematical Theory of Advanced Computing (Hardcover, 2020 ed.)
Wolfgang W. Osterhage
R665 Discovery Miles 6 650 Ships in 18 - 22 working days

This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlapping non-interfering (virtual) address spaces. This approach is based on a newly developed jump transformation between different symbol spaces. Another approach deals with efficiency and accuracy in scientific calculations. Finally the concept of a Neural Relational Data Base Management System is introduced and the performance potential of quantum computers assessed.

Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International... Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Anja Lehmann, Diane Whitehouse, Simone Fischer-Hubner, Lothar Fritsch, Charles Raab
R2,228 Discovery Miles 22 280 Ships in 18 - 22 working days

This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016. The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.

Cybercrime Case Presentation - An Excerpt from Placing The Suspect Behind The Keyboard (Paperback, Abridged edition): Brett... Cybercrime Case Presentation - An Excerpt from Placing The Suspect Behind The Keyboard (Paperback, Abridged edition)
Brett Shavers
R591 Discovery Miles 5 910 Ships in 18 - 22 working days

"Cybercrime Case Presentation "is a "first look" excerpt from Brett Shavers' new Syngress book, "Placing the Suspect Behind the Keyboard. "Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they observed the case as it happened.

Cloud Data Center Network Architectures and Technologies (Hardcover): Lei Zhang, Le Chen Cloud Data Center Network Architectures and Technologies (Hardcover)
Lei Zhang, Le Chen; Contributions by Yang Chang Qing
R3,550 Discovery Miles 35 500 Ships in 10 - 15 working days

Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This book describes in detail the architecture design, technical implementation, planning and design, and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical evolution of DCNs, with the aim of helping readers understand the development of DCNs. It then proceeds to explain the design and implementation of cloud DCNs, including the service model of a single data center (DC), construction of physical and logical networks of DCs, construction of multiple DCNs, and security solutions of DCs. Next, this book dives deep into practices of cloud DCN deployment based on real-world cases to help readers better understand how to build cloud DCNs. Finally, this book introduces DCN openness and some of the hottest forward-looking technologies. In summary, you can use this book as a reference to help you to build secure, reliable, efficient, and open cloud DCNs. It is intended for technical professionals of enterprises, research institutes, information departments, and DCs, as well as teachers and students of computer network-related majors in colleges and universities. Authors Lei Zhang Mr. Zhang is the Chief Architect of Huawei's DCN solution. He has more than 20 years' experience in network product and solution design, as well as a wealth of expertise in product design and development, network planning and design, and network engineering project implementation. He has led the design and deployment of more than 10 large-scale DCNs for Fortune Global 500 companies worldwide. Le Chen Mr. Chen is a Huawei DCN Solution Documentation Engineer with eight years' experience in developing documents related to DCN products and solutions. He has participated in the design and delivery of multiple large-scale enterprise DCNs. Mr. Chen has written many popular technical document series, such as DCN Handbook and BGP Topic.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A is for Algae
Jillian Freese Hardcover R626 Discovery Miles 6 260
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish Paperback R984 Discovery Miles 9 840
PAW Patrol First Writing Activity Book…
Paperback R120 R108 Discovery Miles 1 080
The Quadratic Assignment Problem…
E. Cela Hardcover R4,174 Discovery Miles 41 740
Alphablocks Fun Phonics: A Lift-the-Flap…
Sweet Cherry Publishing Board book R356 R327 Discovery Miles 3 270
A Farmer's Alphabet
Christina Allen Hardcover R471 Discovery Miles 4 710
Alphablocks ABC: A Wipe-Clean Book
Sweet Cherry Publishing Board book R275 R242 Discovery Miles 2 420
Bear's ABC Book - The ABCs of Social and…
Lindsey Kealey Hardcover R460 R432 Discovery Miles 4 320
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730
Nondifferentiable Optimization and…
N. Z. Shor Hardcover R4,231 Discovery Miles 42 310

 

Partners