0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (589)
  • R500+ (5,151)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback):... The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback)
Damilare D. Fagbemi, David Wheeler, J.C. Wheeler
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

Acquiring Card Payments (Paperback): Ilya Dubinsky Acquiring Card Payments (Paperback)
Ilya Dubinsky
R1,471 Discovery Miles 14 710 Ships in 10 - 15 working days

This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction. A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology

Military Applications of Data Analytics (Paperback): Kevin Huggins Military Applications of Data Analytics (Paperback)
Kevin Huggins
R1,465 Discovery Miles 14 650 Ships in 10 - 15 working days

Military organizations around the world are normally huge producers and consumers of data. Accordingly, they stand to gain from the many benefits associated with data analytics. However, for leaders in defense organizations-either government or industry-accessible use cases are not always available. This book presents a diverse collection of cases that explore the realm of possibilities in military data analytics. These use cases explore such topics as: Context for maritime situation awareness Data analytics for electric power and energy applications Environmental data analytics in military operations Data analytics and training effectiveness evaluation Harnessing single board computers for military data analytics Analytics for military training in virtual reality environments A chapter on using single board computers explores their application in a variety of domains, including wireless sensor networks, unmanned vehicles, and cluster computing. The investigation into a process for extracting and codifying expert knowledge provides a practical and useful model for soldiers that can support diagnostics, decision making, analysis of alternatives, and myriad other analytical processes. Data analytics is seen as having a role in military learning, and a chapter in the book describes the ongoing work with the United States Army Research Laboratory to apply data analytics techniques to the design of courses, evaluation of individual and group performances, and the ability to tailor the learning experience to achieve optimal learning outcomes in a minimum amount of time. Another chapter discusses how virtual reality and analytics are transforming training of military personnel. Virtual reality and analytics are also transforming monitoring, decision making, readiness, and operations. Military Applications of Data Analytics brings together a collection of technical and application-oriented use cases. It enables decision makers and technologists to make connections between data analytics and such fields as virtual reality and cognitive science that are driving military organizations around the world forward.

CBAP (R) Certification and BABOK (R) Study Guide (Paperback): Hans Jonasson CBAP (R) Certification and BABOK (R) Study Guide (Paperback)
Hans Jonasson
R1,488 Discovery Miles 14 880 Ships in 10 - 15 working days

The book covers all knowledge areas from the BABOK (R), Third Edition, and is designed to be a study guide for the CBAP (R) certification from IIBA (TM). It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA (R) certification. This book is a complete business analysis handbook combining the latest standards from the BABOK (R) case study examples and exercises with solutions. It has usable tools and techniques, as well as templates ready to be used to develop solid requirements to be the cornerstone for any successful product development.

Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised... Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers (Hardcover, 1st ed. 2019)
Gilbert Peterson, Sujeet Shenoi
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: forensic models, mobile and embedded device forensics, filesystem forensics, image forensics, and forensic techniques. This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of fourteen edited papers from the Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2019. Advances in Digital Forensics XV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Information Centric Networks (ICN) - Architecture & Current Trends (Hardcover, 1st ed. 2021): Nitul Dutta, Hiren Kumar Deva... Information Centric Networks (ICN) - Architecture & Current Trends (Hardcover, 1st ed. 2021)
Nitul Dutta, Hiren Kumar Deva Sarma, Rajendrasinh Jadeja, Krishna Delvadia, Gheorghita Ghinea
R4,695 Discovery Miles 46 950 Ships in 18 - 22 working days

This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.

Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.): Jun Li, Peter Reiher, Gerald J. Popek Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.)
Jun Li, Peter Reiher, Gerald J. Popek
R2,741 Discovery Miles 27 410 Ships in 18 - 22 working days

In 1775, Paul Revere, the folk hero of the American Revolution, galloped wildly on horseback through small towns to warn American colonists that the British were coming. In today's Internet age, how do we warn vast numbers of computers about impending cyber attacks?

Rapid and widespread dissemination of security updates throughout the Internet would be invaluable for many purposes, including sending early-warning signals, distributing new virus signatures, updating certificate revocation lists, dispatching event information for intrusion detection systems, etc. However, notifying a large number of machines securely, quickly, and with high assurance is very challenging. Such a system must compete with the propagation of threats, handle complexities in large-scale environments, address interruption attacks toward dissemination, and also secure itself.

Disseminating Security Updates at Internet Scale describes a new system, "Revere," that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of "Revere" gathered using a large-scale oriented approach. These measurements suggest that "Revere" can deliver security updates at the required scale, speed and resiliency for a reasonable cost.

Disseminating Security Updates at Internet Scale is designed to meet the needs of researchers and practitioners in industry and graduate students in computer science. This book will also be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by "Revere." The "Revere" solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.

Security and Organization within IoT and Smart Cities (Paperback): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Paperback)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Secure, Resilient, and Agile Software Development (Paperback): Mark Merkow Secure, Resilient, and Agile Software Development (Paperback)
Mark Merkow
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

Secrets of a Cyber Security Architect (Paperback): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Paperback)
Brook S. E. Schoenfield
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

Security in Cyberspace - Targeting Nations, Infrastructures, Individuals (Hardcover): Giampiero Giacomello Security in Cyberspace - Targeting Nations, Infrastructures, Individuals (Hardcover)
Giampiero Giacomello
R4,312 Discovery Miles 43 120 Ships in 10 - 15 working days

Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking.

Reforming European Data Protection Law (Hardcover, 2015 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert Reforming European Data Protection Law (Hardcover, 2015 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert
R4,397 R3,596 Discovery Miles 35 960 Save R801 (18%) Ships in 10 - 15 working days

This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Penetration Tester's Open Source Toolkit (Paperback, 4th edition): Jeremy Faircloth Penetration Tester's Open Source Toolkit (Paperback, 4th edition)
Jeremy Faircloth
R1,302 Discovery Miles 13 020 Ships in 10 - 15 working days

Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,299 Discovery Miles 12 990 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Mobile Security and Privacy - Advances, Challenges and Future Research Directions (Paperback): Man-Ho Au, Raymond Choo Mobile Security and Privacy - Advances, Challenges and Future Research Directions (Paperback)
Man-Ho Au, Raymond Choo
R1,941 Discovery Miles 19 410 Ships in 10 - 15 working days

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo-leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.

Business Analytics and Cyber Security Management in Organizations (Hardcover): Rajagopal, Ramesh Behl Business Analytics and Cyber Security Management in Organizations (Hardcover)
Rajagopal, Ramesh Behl
R5,427 Discovery Miles 54 270 Ships in 18 - 22 working days

Traditional marketing techniques have become outdated by the emergence of the internet, and for companies to survive in the new technological marketplace, they must adopt digital marketing and business analytics practices. Unfortunately, with the benefits of improved storage and flow of information comes the risk of cyber-attack. Business Analytics and Cyber Security Management in Organizations compiles innovative research from international professionals discussing the opportunities and challenges of the new era of online business. Outlining updated discourse for business analytics techniques, strategies for data storage, and encryption in emerging markets, this book is ideal for business professionals, practicing managers, and students of business.

The Web Application Hacker's Handbook: Finding and  Exploiting Security Flaws 2e (Paperback, 2nd Edition): D Stuttard The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws 2e (Paperback, 2nd Edition)
D Stuttard
R1,341 R1,101 Discovery Miles 11 010 Save R240 (18%) Ships in 9 - 17 working days

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. * Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition * Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more * Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March... Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Jason Staggs, Sujeet Shenoi
R2,701 Discovery Miles 27 010 Ships in 18 - 22 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover)
Steve King; Edited by Kiren Chaudry
R3,361 Discovery Miles 33 610 Ships in 10 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Paperback)
Steve King; Edited by Kiren Chaudry
R979 Discovery Miles 9 790 Ships in 10 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018): Tsuyoshi Takagi,... Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R4,090 Discovery Miles 40 900 Ships in 18 - 22 working days

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.

Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence (Hardcover, 1st ed. 2022):... Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence (Hardcover, 1st ed. 2022)
Mohiuddin Ahmed, Sheikh Rabiul Islam, Adnan Anwar, Nour Moustafa, Al-Sakib Khan Pathan
R2,221 Discovery Miles 22 210 Ships in 10 - 15 working days

This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition)
Nick Catrantzos
R1,830 Discovery Miles 18 300 Ships in 10 - 15 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Network Security and Cryptography (Paperback): Sarhan M. Musa Network Security and Cryptography (Paperback)
Sarhan M. Musa
R1,200 R1,003 Discovery Miles 10 030 Save R197 (16%) Ships in 18 - 22 working days

Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions

Information Security Science - Measuring the Vulnerability to Data Compromises (Paperback): Carl Young Information Security Science - Measuring the Vulnerability to Data Compromises (Paperback)
Carl Young
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Field Programming Environment: A…
Steven P. Reiss Hardcover R4,177 Discovery Miles 41 770
New Developments in Statistical…
Zhezhen Jin, Mengling Liu, … Hardcover R4,614 Discovery Miles 46 140
Introducing Delphi Programming - Theory…
John Barrow, Linda Miller, … Paperback  (1)
R785 Discovery Miles 7 850
C++ and Object-Oriented Numeric…
Daoqi Yang Hardcover R2,496 Discovery Miles 24 960
Multiprocessor Execution of Logic…
Gopal Gupta Hardcover R4,148 Discovery Miles 41 480
Dynamics and Management of Reasoning…
John-Jules Ch. Meyer, Jan Treur Hardcover R2,862 Discovery Miles 28 620
Lectures on the Nearest Neighbor Method
Gerard Biau, Luc Devroye Hardcover R3,121 R2,337 Discovery Miles 23 370
Advanced Visual Basic 6 - Power…
Matthew Curland, Gary Clarke Paperback R1,273 Discovery Miles 12 730
Essential Java for Scientists and…
Brian Hahn, Katherine Malan Paperback R1,266 Discovery Miles 12 660
Visual Language Theory
Kim Marriott, Bernd Meyer Hardcover R2,862 Discovery Miles 28 620

 

Partners