0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (600)
  • R500+ (5,148)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Security Risk Models for Cyber Insurance (Paperback): Caroline Baylon, Jose Vila, David Rios Insua Security Risk Models for Cyber Insurance (Paperback)
Caroline Baylon, Jose Vila, David Rios Insua
R1,542 Discovery Miles 15 420 Ships in 10 - 15 working days

Tackling the cybersecurity challenge is a matter of survival for society at large. Cyber attacks are rapidly increasing in sophistication and magnitude-and in their destructive potential. New threats emerge regularly, the last few years having seen a ransomware boom and distributed denial-of-service attacks leveraging the Internet of Things. For organisations, the use of cybersecurity risk management is essential in order to manage these threats. Yet current frameworks have drawbacks which can lead to the suboptimal allocation of cybersecurity resources. Cyber insurance has been touted as part of the solution - based on the idea that insurers can incentivize companies to improve their cybersecurity by offering premium discounts - but cyber insurance levels remain limited. This is because companies have difficulty determining which cyber insurance products to purchase, and insurance companies struggle to accurately assess cyber risk and thus develop cyber insurance products. To deal with these challenges, this volume presents new models for cybersecurity risk management, partly based on the use of cyber insurance. It contains: A set of mathematical models for cybersecurity risk management, including (i) a model to assist companies in determining their optimal budget allocation between security products and cyber insurance and (ii) a model to assist insurers in designing cyber insurance products. The models use adversarial risk analysis to account for the behavior of threat actors (as well as the behavior of companies and insurers). To inform these models, we draw on psychological and behavioural economics studies of decision-making by individuals regarding cybersecurity and cyber insurance. We also draw on organizational decision-making studies involving cybersecurity and cyber insurance. Its theoretical and methodological findings will appeal to researchers across a wide range of cybersecurity-related disciplines including risk and decision analysis, analytics, technology management, actuarial sciences, behavioural sciences, and economics. The practical findings will help cybersecurity professionals and insurers enhance cybersecurity and cyber insurance, thus benefiting society as a whole. This book grew out of a two-year European Union-funded project under Horizons 2020, called CYBECO (Supporting Cyber Insurance from a Behavioral Choice Perspective).

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,784 Discovery Miles 37 840 Ships in 10 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,357 Discovery Miles 43 570 Ships in 10 - 15 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Paperback)
Ravi Das
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Strategic Cyber Security Management (Hardcover): Peter Trim, Yang-Im Lee Strategic Cyber Security Management (Hardcover)
Peter Trim, Yang-Im Lee
R5,068 Discovery Miles 50 680 Ships in 10 - 15 working days

This textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to: * evaluate different types of cyber risk * carry out a threat analysis and place cyber threats in order of severity * formulate appropriate cyber security management policy * establish an organization-specific intelligence framework and security culture * devise and implement a cyber security awareness programme * integrate cyber security within an organization's operating system Learning objectives, chapter summaries and further reading in each chapter provide structure and routes to further in-depth research. Firm theoretical grounding is coupled with short problem-based case studies reflecting a range of organizations and perspectives, illustrating how the theory translates to practice, with each case study followed by a set of questions to encourage understanding and analysis. Non-technical and comprehensive, this textbook shows final year undergraduate students and postgraduate students of Cyber Security Management, as well as reflective practitioners, how to adopt a pro-active approach to the management of cyber security. Online resources include PowerPoint slides, an instructor's manual and a test bank of questions.

Information Governance and Security - Protecting and Managing Your Company's Proprietary Information (Paperback): John... Information Governance and Security - Protecting and Managing Your Company's Proprietary Information (Paperback)
John Iannarelli, Michael O'Shaughnessy
R1,034 Discovery Miles 10 340 Ships in 10 - 15 working days

Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of.

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,461 Discovery Miles 24 610 Ships in 10 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,776 Discovery Miles 57 760 Ships in 10 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Hardcover, 2013 ed.): Eric Peeters Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Hardcover, 2013 ed.)
Eric Peeters
R3,225 Discovery Miles 32 250 Ships in 18 - 22 working days

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Cybersecurity for Industry 4.0 - Analysis for Design and Manufacturing (Hardcover, 1st ed. 2017): Lane Thames, Dirk Schaefer Cybersecurity for Industry 4.0 - Analysis for Design and Manufacturing (Hardcover, 1st ed. 2017)
Lane Thames, Dirk Schaefer
R4,993 Discovery Miles 49 930 Ships in 10 - 15 working days

This book introduces readers to cybersecurity and its impact on the realization of the Industry 4.0 vision. It covers the technological foundations of cybersecurity within the scope of the Industry 4.0 landscape and details the existing cybersecurity threats faced by Industry 4.0, as well as state-of-the-art solutions with regard to both academic research and practical implementations. Industry 4.0 and its associated technologies, such as the Industrial Internet of Things and cloud-based design and manufacturing systems are examined, along with their disruptive innovations. Further, the book analyzes how these phenomena capitalize on the economies of scale provided by the Internet. The book offers a valuable resource for practicing engineers and decision makers in industry, as well as researchers in the design and manufacturing communities and all those interested in Industry 4.0 and cybersecurity.

Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK... Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Hardcover, 1st ed. 2023)
Reza Montasari
R4,617 Discovery Miles 46 170 Ships in 10 - 15 working days

This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the manufacture of security, the threats to freedom and the levels of social control in the surveillance state. This book also examines the malevolent use of AI and associated technologies by state and non-state actors. Along with this analysis, it investigates the key legal, political, ethical, privacy and human rights implications of the national security uses of AI in the stated democracies. This book provides a set of policy recommendations to help to mitigate these challenges. Researchers working in the security field as well advanced level students in computer science focused on security will find this book useful as a reference. Cyber security professionals, network security analysts, police and law enforcement agencies will also want to purchase this book.

Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International... Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers (Hardcover, 1st ed. 2016)
David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hubner, Charles Raab
R3,199 R2,028 Discovery Miles 20 280 Save R1,171 (37%) Ships in 10 - 15 working days

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.

Secure Cloud Computing (Hardcover, 2014 ed.): Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup,... Secure Cloud Computing (Hardcover, 2014 ed.)
Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, …
R4,263 R3,462 Discovery Miles 34 620 Save R801 (19%) Ships in 10 - 15 working days

This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine's memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission's exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system's state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,814 Discovery Miles 18 140 Ships in 10 - 15 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

Security Awareness Design in the New Normal Age (Hardcover): Wendy F. Goucher Security Awareness Design in the New Normal Age (Hardcover)
Wendy F. Goucher
R1,976 Discovery Miles 19 760 Ships in 10 - 15 working days

Unique selling point: * Uses research and experience of designing and implementing security awareness programs in the modern workplace to examine at how you can make your security awareness message more impactful. Core audience: * Chief Information Security Officers, Data Protection Managers, Security Awareness trainers and designers and Cyber Security Managers Place in the market: * Considers the challenge of maintaining good security awareness with Post-COVID work practices

Policing Transnational Organized Crime and Corruption - Exploring the Role of Communication Interception Technology (Hardcover,... Policing Transnational Organized Crime and Corruption - Exploring the Role of Communication Interception Technology (Hardcover, New)
M. Congram, P. Bell, Mark Lauchs
R1,748 Discovery Miles 17 480 Ships in 10 - 15 working days

Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organised crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises.Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organised crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing.Policing Transnational Organised Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.

Implementing Electronic Card Payment Systems (Hardcover): Cristian Radu Implementing Electronic Card Payment Systems (Hardcover)
Cristian Radu
R2,810 Discovery Miles 28 100 Ships in 18 - 22 working days

As magnetic stripe cards are being replaced by chip cards that offer consumers and businesses greater protection against fraud, a new standard for this debit/credit card technology is being introduced by Europay, MasterCard, and Visa (EMV). This cutting-edge, new book provides professionals with a comprehensive overview of the EMV chip solution and explains why more and more important industry players will be adopting this technology.

The book offers a better understanding of the security problems associated with magnetic stripe cards, and presents the business case for migrating to this new chip technology. Moreover, it shows professionals how to design a multi-application EMV chip card layout, and explains important implementation details for EMV chip cards and terminals. This first-of-its-kind resource also discusses the organizational and management issues in connection with the EMV chip migration and the use of EMV chip cards in e-commerce and m-commerce transactions.

Handbook of Information Security (Hardcover): Audrey Coon Handbook of Information Security (Hardcover)
Audrey Coon
R3,329 R3,014 Discovery Miles 30 140 Save R315 (9%) Ships in 18 - 22 working days
Computer Security Fundamentals (Paperback, 5th edition): William Easttom Computer Security Fundamentals (Paperback, 5th edition)
William Easttom
R1,815 R1,474 Discovery Miles 14 740 Save R341 (19%) Ships in 5 - 10 working days

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The perfect beginner's guide for anyone interested in a computer security career Dr. Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started. Drawing on 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you've learned. LEARN HOW TO Identify and prioritize potential threats to your network Use basic networking knowledge to improve security Get inside the minds of hackers, so you can deter their attacks Implement a proven layered approach to network security Resist modern social engineering attacks Defend against today's most common Denial of Service (DoS) attacks Halt viruses, spyware, worms, Trojans, and other malware Prevent problems arising from malfeasance or ignorance Choose the best encryption methods for your organization Compare security technologies, including the latest security appliances Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Master basic computer forensics and know what to do if you're attacked Learn how cyberterrorism and information warfare are evolving

Ransomware and Cybercrime (Paperback): Andrew Jenkinson Ransomware and Cybercrime (Paperback)
Andrew Jenkinson
R1,062 Discovery Miles 10 620 Ships in 10 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R4,365 Discovery Miles 43 650 Ships in 10 - 15 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Cybersecurity and Privacy in Cyber Physical Systems (Paperback): Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim... Cybersecurity and Privacy in Cyber Physical Systems (Paperback)
Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader's awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.

Cyber Insecurity - Navigating the Perils of the Next Information Age (Hardcover): Richard Harrison, Trey Herr Cyber Insecurity - Navigating the Perils of the Next Information Age (Hardcover)
Richard Harrison, Trey Herr; Foreword by Richard J. Danzig
R2,391 Discovery Miles 23 910 Ships in 10 - 15 working days

Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow-and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods. * Learn more at the book's website at http://www.cyberinsecuritybook.org

Blockchain and Other Emerging Technologies for Digital Business Strategies (Hardcover, 1st ed. 2022): Hamid Jahankhani, David... Blockchain and Other Emerging Technologies for Digital Business Strategies (Hardcover, 1st ed. 2022)
Hamid Jahankhani, David V. Kilpin, Stefan Kendzierskyj
R3,998 Discovery Miles 39 980 Ships in 10 - 15 working days

This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem. The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master's degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

Building an Intelligence-Led Security Program (Paperback): Allan Liska Building an Intelligence-Led Security Program (Paperback)
Allan Liska
R1,286 Discovery Miles 12 860 Ships in 10 - 15 working days

As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
John Muir - A Miscellany
Paperback R286 R261 Discovery Miles 2 610
An Island
Karen Jennings Paperback  (1)
R325 Discovery Miles 3 250
Malarial Drug Delivery Systems…
Ranjita Shegokar, Yashwant Pathak Hardcover R4,631 Discovery Miles 46 310
Narreskip - Gedigte
Johan Myburg Paperback R250 Discovery Miles 2 500
Resurrection
Danielle Steel Paperback R385 R315 Discovery Miles 3 150
Return To The Wild
James Hendry Paperback  (3)
R340 R308 Discovery Miles 3 080
The Analecta
Harshvardhan Rai Paperback R267 Discovery Miles 2 670
Still Life
Sarah Winman Paperback R361 Discovery Miles 3 610
The Algebra Of Insignificance
Stephen Symons Paperback R180 R167 Discovery Miles 1 670
The Lost Boys
Faye Kellerman Paperback R330 R227 Discovery Miles 2 270

 

Partners