0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (272)
  • R250 - R500 (606)
  • R500+ (5,292)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Machine Learning, Blockchain, and Cyber Security in  Smart Environments - Application and Challenges (Hardcover): Sarvesh... Machine Learning, Blockchain, and Cyber Security in Smart Environments - Application and Challenges (Hardcover)
Sarvesh Tanwar, Sumit Badotra, Ajay Rana
R3,747 R3,467 Discovery Miles 34 670 Save R280 (7%) Ships in 12 - 17 working days

Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation. The book focuses on the benefits related to the emerging applications such as machine learning, blockchain and cyber security. Key Features: Introduces the latest trends in the fields of machine learning, blockchain and cyber security Discusses the fundamentals, challenges and architectural overviews with concepts Explores recent advancements in machine learning, blockchain, and cyber security Examines recent trends in emerging technologies This book is primarily aimed at graduates, researchers, and professionals working in the areas of machine learning, blockchain, and cyber security.

(R)evolution - Security Challenges Past and Present (Hardcover): Neil Kent (R)evolution - Security Challenges Past and Present (Hardcover)
Neil Kent; Irina du Quenoy
R4,916 Discovery Miles 49 160 Ships in 10 - 15 working days

This collection of essays comprises a series of think-pieces about the security challenges of the present, both in the realm of cyberspace and otherwise, with a particular consideration of the promise and possible negative effects of new digital technologies. French military academy instructor Gerard de Boisboissel considers the contemporary digital transformation of his country's military and proposes ways to ensure its maximum effectiveness. Retired American senior intelligence officer Leslie Gruis takes the long historical view, examining parallels between the effects of the current technological revolution and the transformation wrought by the invention of the printing press. Columbia University research scholar Michael Klipstein and coauthor Peter Chuzie analyze the potential offered for intelligence collection by the Internet of Things. And British academic Craig Stanley-Adamson explores the lessons that may be drawn from the relationship between Israel and its neighbors in the first decade post 9/11, arguing that it was characterized by a surprising degree of cooperation in the security realm that may, given auspicious circumstances, be repeated in the future.

Transparent User Authentication - Biometrics, RFID and Behavioural Profiling (Hardcover, Edition.): Nathan Clarke Transparent User Authentication - Biometrics, RFID and Behavioural Profiling (Hardcover, Edition.)
Nathan Clarke
R2,806 Discovery Miles 28 060 Ships in 10 - 15 working days

This groundbreaking text examines the problem of user authentication from a completely new viewpoint. Rather than describing the requirements, technologies and implementation issues of designing point-of-entry authentication, the book introduces and investigates the technological requirements of implementing transparent user authentication - where authentication credentials are captured during a user's normal interaction with a system. This approach would transform user authentication from a binary point-of-entry decision to a continuous identity confidence measure. Topics and features: discusses the need for user authentication; reviews existing authentication approaches; introduces novel behavioural biometrics techniques; examines the wider system-specific issues with designing large-scale multimodal authentication systems; concludes with a look to the future of user authentication.

Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Hardcover): Maurice Dawson, Dakshina Ranjan... Developing Next-Generation Countermeasures for Homeland Security Threat Prevention (Hardcover)
Maurice Dawson, Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
R5,540 Discovery Miles 55 400 Ships in 12 - 17 working days

In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments and organizations to steel themselves against these threats in innovative ways. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.

Logic Locking - A Practical Approach to Secure Hardware (Hardcover, 1st ed. 2023): Dominik Sisejkovic, Rainer Leupers Logic Locking - A Practical Approach to Secure Hardware (Hardcover, 1st ed. 2023)
Dominik Sisejkovic, Rainer Leupers
R2,804 Discovery Miles 28 040 Ships in 10 - 15 working days

A subtle change that leads to disastrous consequences-hardware Trojans undoubtedly pose one of the greatest security threats to the modern age. How to protect hardware against these malicious modifications? One potential solution hides within logic locking; a prominent hardware obfuscation technique. In this book, we take a step-by-step approach to understanding logic locking, from its fundamental mechanics, over the implementation in software, down to an in-depth analysis of security properties in the age of machine learning. This book can be used as a reference for beginners and experts alike who wish to dive into the world of logic locking, thereby having a holistic view of the entire infrastructure required to design, evaluate, and deploy modern locking policies.

Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016): Mohammad A. Tayebi,... Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016)
Mohammad A. Tayebi, Uwe Glasser
R3,426 R2,887 Discovery Miles 28 870 Save R539 (16%) Ships in 12 - 17 working days

This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.

Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (Hardcover): Ashish Kumar Luhach, Atilla Elci Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (Hardcover)
Ashish Kumar Luhach, Atilla Elci
R6,527 Discovery Miles 65 270 Ships in 12 - 17 working days

Cyber-physical systems (CPS) have emerged as a unifying name for systems where cyber parts (i.e., the computing and communication parts) and physical parts are tightly integrated, both in design and during operation. Such systems use computations and communication deeply embedded in and interacting with human physical processes as well as augmenting existing and adding new capabilities. As such, CPS is an integration of computation, networking, and physical processes. Embedded computers and networks monitor and control the physical processes, with feedback loops where physical processes affect computations and vice versa. The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology. Artificial Intelligence Paradigms for Smart Cyber-Physical Systems focuses on the recent advances in Artificial intelligence-based approaches towards affecting secure cyber-physical systems. This book presents investigations on state-of-the-art research issues, applications, and achievements in the field of computational intelligence paradigms for CPS. Covering topics that include autonomous systems, access control, machine learning, and intrusion detection and prevention systems, this book is ideally designed for engineers, industry professionals, practitioners, scientists, managers, students, academicians, and researchers seeking current research on artificial intelligence and cyber-physical systems.

Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields... Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields (Hardcover, 1st ed. 2020)
Atsuko Miyaji, Tomoaki Mimoto
R1,535 Discovery Miles 15 350 Ships in 12 - 17 working days

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique.This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don't include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.

Security Fundamentals for E-commerce (Hardcover): Vesna Hassler Security Fundamentals for E-commerce (Hardcover)
Vesna Hassler 1
R2,753 Discovery Miles 27 530 Ships in 10 - 15 working days

In the world of e-commerce, security has quickly become of paramount importance. This unique book provides an in-depth understanding of basic security problems and relevant e-commerce solutions. From designing secure Web, e-commerce, and mobile commerce applications to securing internal networks to providing secure employee/user authentication, this cutting-edge book gives professionals the tools they need to solve their e-commerce security problems.

Strategic Cyber Security Management (Hardcover): Peter Trim, Yang-Im Lee Strategic Cyber Security Management (Hardcover)
Peter Trim, Yang-Im Lee
R4,453 Discovery Miles 44 530 Ships in 12 - 17 working days

This textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to: * evaluate different types of cyber risk * carry out a threat analysis and place cyber threats in order of severity * formulate appropriate cyber security management policy * establish an organization-specific intelligence framework and security culture * devise and implement a cyber security awareness programme * integrate cyber security within an organization's operating system Learning objectives, chapter summaries and further reading in each chapter provide structure and routes to further in-depth research. Firm theoretical grounding is coupled with short problem-based case studies reflecting a range of organizations and perspectives, illustrating how the theory translates to practice, with each case study followed by a set of questions to encourage understanding and analysis. Non-technical and comprehensive, this textbook shows final year undergraduate students and postgraduate students of Cyber Security Management, as well as reflective practitioners, how to adopt a pro-active approach to the management of cyber security. Online resources include PowerPoint slides, an instructor's manual and a test bank of questions.

Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover): Jack M Wedam Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover)
Jack M Wedam
R679 Discovery Miles 6 790 Ships in 12 - 17 working days
How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover): Ravi Das How to Start Your Own Cybersecurity Consulting Business - First-Hand Lessons from a Burned-Out Ex-CISO (Hardcover)
Ravi Das
R3,319 Discovery Miles 33 190 Ships in 12 - 17 working days

Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,156 Discovery Miles 51 560 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Ethical Digital Technology in Practice (Hardcover): Simon Rogerson Ethical Digital Technology in Practice (Hardcover)
Simon Rogerson
R4,168 R3,888 Discovery Miles 38 880 Save R280 (7%) Ships in 12 - 17 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Networking, Intelligent Systems and Security - Proceedings of NISS 2021 (Hardcover, 1st ed. 2022): Mohamed Ben Ahmed,... Networking, Intelligent Systems and Security - Proceedings of NISS 2021 (Hardcover, 1st ed. 2022)
Mohamed Ben Ahmed, Horia-Nicolai L. Teodorescu, Tomader Mazri, Parthasarathy Subashini, Anouar Abdelhakim Boudhir
R7,080 Discovery Miles 70 800 Ships in 10 - 15 working days

This book gathers best selected research papers presented at the International Conference on Networking, Intelligent Systems and Security, held in Kenitra, Morocco, during 01-02 April 2021. The book highlights latest research and findings in the field of ICT, and it provides new solutions, efficient tools, and techniques that draw on modern technologies to increase urban services. In addition, it provides a critical overview of the status quo, shares new propositions, and outlines future perspectives in networks, smart systems, security, information technologies, and computer science.

SCION: A Secure Internet Architecture (Hardcover, 1st ed. 2017): Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk,... SCION: A Secure Internet Architecture (Hardcover, 1st ed. 2017)
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat
R2,495 R2,108 Discovery Miles 21 080 Save R387 (16%) Ships in 12 - 17 working days

This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.

The Art of Attack - Attacker Mindset for Security Professionals (Paperback): M Reynolds The Art of Attack - Attacker Mindset for Security Professionals (Paperback)
M Reynolds
R560 R510 Discovery Miles 5 100 Save R50 (9%) Ships in 12 - 17 working days

Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker. The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. You'll discover: A variety of attacker strategies, including approaches, processes, reconnaissance, privilege escalation, redundant access, and escape techniques The unique tells and signs of an attack and how to avoid becoming a victim of one What the science of psychology tells us about amygdala hijacking and other tendencies that you need to protect against Perfect for red teams, social engineers, pentesters, and ethical hackers seeking to fortify and harden their systems and the systems of their clients, The Art of Attack is an invaluable resource for anyone in the technology security space seeking a one-stop resource that puts them in the mind of an attacker.

Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence (Hardcover, 1st ed. 2022):... Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence (Hardcover, 1st ed. 2022)
Mohiuddin Ahmed, Sheikh Rabiul Islam, Adnan Anwar, Nour Moustafa, Al-Sakib Khan Pathan
R3,150 R2,187 Discovery Miles 21 870 Save R963 (31%) Ships in 12 - 17 working days

This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.

Cybersecurity Awareness (Hardcover, 1st ed. 2022): Jerry Andriessen, Thomas Schaberreiter, Alexandros Papanikolaou, Juha Roening Cybersecurity Awareness (Hardcover, 1st ed. 2022)
Jerry Andriessen, Thomas Schaberreiter, Alexandros Papanikolaou, Juha Roening
R3,622 Discovery Miles 36 220 Ships in 12 - 17 working days

This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology. This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security. Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed. This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book.

Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK... Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity (Hardcover, 1st ed. 2023)
Reza Montasari
R4,565 Discovery Miles 45 650 Ships in 12 - 17 working days

This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity. More specifically, this book explores ways in which the adoption of AI algorithms (such as Machine Learning, Deep Learning, Natural Language Processing, and Big Data Predictive Analytics (BDPAs) transforms law enforcement agencies (LEAs) and intelligence service practices. It explores the roles that these technologies play in the manufacture of security, the threats to freedom and the levels of social control in the surveillance state. This book also examines the malevolent use of AI and associated technologies by state and non-state actors. Along with this analysis, it investigates the key legal, political, ethical, privacy and human rights implications of the national security uses of AI in the stated democracies. This book provides a set of policy recommendations to help to mitigate these challenges. Researchers working in the security field as well advanced level students in computer science focused on security will find this book useful as a reference. Cyber security professionals, network security analysts, police and law enforcement agencies will also want to purchase this book.

Information System Audit - How to Control the Digital Disruption (Hardcover): Philippe Peret Information System Audit - How to Control the Digital Disruption (Hardcover)
Philippe Peret
R1,643 Discovery Miles 16 430 Ships in 12 - 17 working days

* Structured approach from fundamental knowledge to entanglements between the concepts and the business needs * Simple and straight to the point presentation with diagrams and figures to help the understanding * Key points to take into account to design and implement an audit strategy based on company size * An overarching book on audit providing links between the different ways to audit a company * No boring or complex audit technical knowledge nor IT technical knowledge * Historical backgrounds to demonstrate that if the digital wave is new however the underlying risks are not.

Securing Government Information and Data in Developing Countries (Hardcover): Saleem Zoughbi Securing Government Information and Data in Developing Countries (Hardcover)
Saleem Zoughbi
R4,219 Discovery Miles 42 190 Ships in 12 - 17 working days

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Hardcover)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R3,756 Discovery Miles 37 560 Ships in 12 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,035 Discovery Miles 30 350 Ships in 12 - 17 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Security Analytics - A Data Centric Approach to Information Security (Hardcover): Mehak Khurana, Shilpa Mahajan Security Analytics - A Data Centric Approach to Information Security (Hardcover)
Mehak Khurana, Shilpa Mahajan
R4,308 R4,028 Discovery Miles 40 280 Save R280 (6%) Ships in 12 - 17 working days

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R6,256 Discovery Miles 62 560
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R619 Discovery Miles 6 190
Handbook of Research on Advancing…
Kamaljeet Sandhu Hardcover R7,909 Discovery Miles 79 090
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig Hardcover R6,256 Discovery Miles 62 560
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,190 Discovery Miles 81 900
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,276 Discovery Miles 12 760
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R500 Discovery Miles 5 000
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
Handbook of Research on Cyber Approaches…
Fahri OEzsungur Hardcover R8,284 Discovery Miles 82 840
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,525 Discovery Miles 65 250

 

Partners