0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (614)
  • R500+ (5,304)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Blockchain Technology in Internet of Things (Hardcover, 1st ed. 2019): Liehuang Zhu, Keke Gai, Meng Li Blockchain Technology in Internet of Things (Hardcover, 1st ed. 2019)
Liehuang Zhu, Keke Gai, Meng Li
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition)
Nick Catrantzos
R1,852 Discovery Miles 18 520 Ships in 12 - 19 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016): Mohammad A. Tayebi,... Social Network Analysis in Predictive Policing - Concepts, Models and Methods (Hardcover, 1st ed. 2016)
Mohammad A. Tayebi, Uwe Glasser
R3,496 R3,096 Discovery Miles 30 960 Save R400 (11%) Ships in 12 - 19 working days

This book focuses on applications of social network analysis in predictive policing. Data science is used to identify potential criminal activity by analyzing the relationships between offenders to fully understand criminal collaboration patterns. Co-offending networks-networks of offenders who have committed crimes together-have long been recognized by law enforcement and intelligence agencies as a major factor in the design of crime prevention and intervention strategies. Despite the importance of co-offending network analysis for public safety, computational methods for analyzing large-scale criminal networks are rather premature. This book extensively and systematically studies co-offending network analysis as effective tool for predictive policing. The formal representation of criminological concepts presented here allow computer scientists to think about algorithmic and computational solutions to problems long discussed in the criminology literature. For each of the studied problems, we start with well-founded concepts and theories in criminology, then propose a computational method and finally provide a thorough experimental evaluation, along with a discussion of the results. In this way, the reader will be able to study the complete process of solving real-world multidisciplinary problems.

CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) (Paperback, 4th edition): Glen Clarke CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) (Paperback, 4th edition)
Glen Clarke
R950 Discovery Miles 9 500 Ships in 12 - 19 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ exam This highly effective test preparation guide covers every objective for the latest version of the CompTIA Security+ exam (exam SY0-601). Written by CompTIA training expert Glen E. Clarke, this new edition has been thoroughly revised to align with the 2020 update to the exam. "Exam Watch" and "On-the-Job" special elements reinforce salient points throughout. With hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) covers what you need to know and shows you how to prepare for the challenging exam. The book features chapter-ending self-tests along with in-depth explanations for the correct and incorrect answers. All questions closely match those on the live test in content, format, tone, and feel. Online content includes more than 400 practice questions, a lab exercises PDF, video training from the author, and performance-based question simulations Includes a 10% off exam voucher coupon, a $35 value Written by a CompTIA certification expert and experienced author

Securing the Nation's Critical Infrastructures - A Guide for the 2021-2025 Administration (Hardcover): ew Spaniel Securing the Nation's Critical Infrastructures - A Guide for the 2021-2025 Administration (Hardcover)
ew Spaniel
R2,990 Discovery Miles 29 900 Ships in 12 - 19 working days

Helps the incoming administration and members of critical infrastructure communities prioritize cybersecurity, combat emerging threats, craft meaningful policy, and consider modernization and nascent technologies. ICIT expects the audience of the publication to include technical and general readers in the critical infrastructures, federal government, and general public. The guide is designed to feature the seventeen critical infrastructure sectors as individual chapters that contain multiple 2,000 - 4,000-word essays.

The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback):... The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback)
Damilare D. Fagbemi, David Wheeler, J.C. Wheeler
R1,482 Discovery Miles 14 820 Ships in 12 - 19 working days

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

Military Applications of Data Analytics (Paperback): Kevin Huggins Military Applications of Data Analytics (Paperback)
Kevin Huggins
R1,463 Discovery Miles 14 630 Ships in 12 - 19 working days

Military organizations around the world are normally huge producers and consumers of data. Accordingly, they stand to gain from the many benefits associated with data analytics. However, for leaders in defense organizations-either government or industry-accessible use cases are not always available. This book presents a diverse collection of cases that explore the realm of possibilities in military data analytics. These use cases explore such topics as: Context for maritime situation awareness Data analytics for electric power and energy applications Environmental data analytics in military operations Data analytics and training effectiveness evaluation Harnessing single board computers for military data analytics Analytics for military training in virtual reality environments A chapter on using single board computers explores their application in a variety of domains, including wireless sensor networks, unmanned vehicles, and cluster computing. The investigation into a process for extracting and codifying expert knowledge provides a practical and useful model for soldiers that can support diagnostics, decision making, analysis of alternatives, and myriad other analytical processes. Data analytics is seen as having a role in military learning, and a chapter in the book describes the ongoing work with the United States Army Research Laboratory to apply data analytics techniques to the design of courses, evaluation of individual and group performances, and the ability to tailor the learning experience to achieve optimal learning outcomes in a minimum amount of time. Another chapter discusses how virtual reality and analytics are transforming training of military personnel. Virtual reality and analytics are also transforming monitoring, decision making, readiness, and operations. Military Applications of Data Analytics brings together a collection of technical and application-oriented use cases. It enables decision makers and technologists to make connections between data analytics and such fields as virtual reality and cognitive science that are driving military organizations around the world forward.

CBAP (R) Certification and BABOK (R) Study Guide (Paperback): Hans Jonasson CBAP (R) Certification and BABOK (R) Study Guide (Paperback)
Hans Jonasson
R1,487 Discovery Miles 14 870 Ships in 12 - 19 working days

The book covers all knowledge areas from the BABOK (R), Third Edition, and is designed to be a study guide for the CBAP (R) certification from IIBA (TM). It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA (R) certification. This book is a complete business analysis handbook combining the latest standards from the BABOK (R) case study examples and exercises with solutions. It has usable tools and techniques, as well as templates ready to be used to develop solid requirements to be the cornerstone for any successful product development.

Security and Organization within IoT and Smart Cities (Paperback): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Paperback)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R1,473 Discovery Miles 14 730 Ships in 12 - 19 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Innovation in Crisis Management (Paperback): Chiara Fonio, Adam Widera, Tomasz Zweglinski Innovation in Crisis Management (Paperback)
Chiara Fonio, Adam Widera, Tomasz Zweglinski
R1,242 Discovery Miles 12 420 Ships in 12 - 19 working days

This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries. The aim of this book is to tackle innovation in crisis management through lessons learnt and experiences gained from the implementation of mixed methods through a practitioner-driven approach in a large-scale demonstration project (DRIVER+). It explores innovation from the perspective of the end-users by focusing on the needs and problems they are trying to address through a tool (be it an app, a drone, or a training program) and takes a deep dive into what is needed to understand if and to what extent the tool they have in mind can really bring innovation. This book is a toolkit for readers interested in understanding what needs to be in place to measure innovation: it provides the know-how through examples and best practices. The book will be a valuable source of knowledge for scientists, practitioners, researchers, and postgraduate students studying safety, crisis management, and innovation.

Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover): Jack M Wedam Cunningly Smart Phones - Deceit, Manipulation, and Private Thoughts Revealed (Hardcover)
Jack M Wedam
R741 Discovery Miles 7 410 Ships in 12 - 19 working days
Investigating Windows Systems (Paperback): Harlan Carvey Investigating Windows Systems (Paperback)
Harlan Carvey
R1,537 Discovery Miles 15 370 Ships in 12 - 19 working days

Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way. Investigating Windows Systems will not address topics which have been covered in other books, but will expect the reader to have some ability to discover the detailed usage of tools and to perform their own research. The focus of this volume is to provide a walk-through of the analysis process, with descriptions of the thought process and the analysis decisions made along the way. A must-have guide for those in the field of digital forensic analysis and incident response.

Applications of Blockchain and Big IoT Systems - Digital Solutions for Diverse Industries (Hardcover): Arun Solanki, Vishal... Applications of Blockchain and Big IoT Systems - Digital Solutions for Diverse Industries (Hardcover)
Arun Solanki, Vishal Jain, Loveleen Gaur
R4,590 Discovery Miles 45 900 Ships in 12 - 19 working days

This new volume explores a plethora of blockchain-based solutions for big data and IoT applications, looking at advances in real-world applications in several sectors, including higher education, cybersecurity, agriculture, business and management, healthcare and biomedical science, construction and project management, smart city development, and others. Chapters explore emerging technology to combat the ever-increasing threat of security to computer systems and offer new architectural solutions for problems encountered in data management and security. The chapters help to provide a high level of understanding of various blockchain algorithms along with the necessary tools and techniques. The novel architectural solutions in the deployment of blockchain presented here are the core of the book.

SCION: A Secure Internet Architecture (Hardcover, 1st ed. 2017): Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk,... SCION: A Secure Internet Architecture (Hardcover, 1st ed. 2017)
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat
R2,546 R2,244 Discovery Miles 22 440 Save R302 (12%) Ships in 12 - 19 working days

This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Paperback)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,317 Discovery Miles 13 170 Ships in 12 - 19 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Semantic Control for the Cybersecurity Domain - Investigation on the Representativeness of a Domain-Specific Terminology... Semantic Control for the Cybersecurity Domain - Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation (Hardcover)
Claudia Lanza
R3,573 Discovery Miles 35 730 Ships in 12 - 19 working days

- Terminological resource to organize and monitor the Cybersecurity knowledge-domain with respect to lexical variation - Methodology to identify the semantic coverage threshold with respect to term variation within specialized domains of study. - The exploitation of distributional semantics methods for the identification of the best condition according to which a semantic resource for specialized domains keeps being representative by time.

Securing Government Information and Data in Developing Countries (Hardcover): Saleem Zoughbi Securing Government Information and Data in Developing Countries (Hardcover)
Saleem Zoughbi
R4,387 Discovery Miles 43 870 Ships in 10 - 15 working days

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.

Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields... Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields (Hardcover, 1st ed. 2020)
Atsuko Miyaji, Tomoaki Mimoto
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique.This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don't include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.

A Hacker's Mind - How the Powerful Bend Society's Rules, and How to Bend them Back (Hardcover): Bruce Schneier A Hacker's Mind - How the Powerful Bend Society's Rules, and How to Bend them Back (Hardcover)
Bruce Schneier
R737 Discovery Miles 7 370 Ships in 12 - 19 working days

A hack is any means of subverting a system's rules in unintended ways. The tax code isn't computer code, but a series of complex formulas. It has vulnerabilities; we call them "loopholes." We call exploits "tax avoidance strategies." And there is an entire industry of "black hat" hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys. In A Hacker's Mind, Bruce Schneier takes hacking out of the world of computing and uses it to analyse the systems that underpin our society: from tax laws to financial markets to politics. He reveals an array of powerful actors whose hacks bend our economic, political and legal systems to their advantage, at the expense of everyone else. Once you learn how to notice hacks, you'll start seeing them everywhere-and you'll never look at the world the same way again. Almost all systems have loopholes, and this is by design. Because if you can take advantage of them, the rules no longer apply to you. Unchecked, these hacks threaten to upend our financial markets, weaken our democracy and even affect the way we think. And when artificial intelligence starts thinking like a hacker-at inhuman speed and scale-the results could be catastrophic. But for those who would don the "white hat," we can understand the hacking mindset and rebuild our economic, political and legal systems to counter those who would exploit our society. And we can harness artificial intelligence to improve existing systems, predict and defend against hacks and realise a more equitable world.

Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (Hardcover): Ashish Kumar Luhach, Atilla Elci Artificial Intelligence Paradigms for Smart Cyber-Physical Systems (Hardcover)
Ashish Kumar Luhach, Atilla Elci
R6,730 Discovery Miles 67 300 Ships in 10 - 15 working days

Cyber-physical systems (CPS) have emerged as a unifying name for systems where cyber parts (i.e., the computing and communication parts) and physical parts are tightly integrated, both in design and during operation. Such systems use computations and communication deeply embedded in and interacting with human physical processes as well as augmenting existing and adding new capabilities. As such, CPS is an integration of computation, networking, and physical processes. Embedded computers and networks monitor and control the physical processes, with feedback loops where physical processes affect computations and vice versa. The economic and societal potential of such systems is vastly greater than what has been realized, and major investments are being made worldwide to develop the technology. Artificial Intelligence Paradigms for Smart Cyber-Physical Systems focuses on the recent advances in Artificial intelligence-based approaches towards affecting secure cyber-physical systems. This book presents investigations on state-of-the-art research issues, applications, and achievements in the field of computational intelligence paradigms for CPS. Covering topics that include autonomous systems, access control, machine learning, and intrusion detection and prevention systems, this book is ideally designed for engineers, industry professionals, practitioners, scientists, managers, students, academicians, and researchers seeking current research on artificial intelligence and cyber-physical systems.

Mathematical Theory of Advanced Computing (Hardcover, 2020 ed.): Wolfgang W. Osterhage Mathematical Theory of Advanced Computing (Hardcover, 2020 ed.)
Wolfgang W. Osterhage
R715 Discovery Miles 7 150 Ships in 10 - 15 working days

This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlapping non-interfering (virtual) address spaces. This approach is based on a newly developed jump transformation between different symbol spaces. Another approach deals with efficiency and accuracy in scientific calculations. Finally the concept of a Neural Relational Data Base Management System is introduced and the performance potential of quantum computers assessed.

Network Security (Hardcover): Perez Network Security (Hardcover)
Perez
R4,093 Discovery Miles 40 930 Ships in 10 - 15 working days

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Hardcover): Nikki. Robinson Mind the Tech Gap - Addressing the Conflicts between IT and Security Teams (Hardcover)
Nikki. Robinson
R3,126 Discovery Miles 31 260 Ships in 12 - 19 working days

1. Learn best practices for every facet of management 2. Learn what type of leader you need to be to succeed 3. Maximize employee engagement and retention among staff 4. Develop your staff's talent to full potential 5. Learn where the future of management is headed

(R)evolution - Security Challenges Past and Present (Hardcover): Neil Kent (R)evolution - Security Challenges Past and Present (Hardcover)
Neil Kent; Irina du Quenoy
R5,054 Discovery Miles 50 540 Ships in 10 - 15 working days

This collection of essays comprises a series of think-pieces about the security challenges of the present, both in the realm of cyberspace and otherwise, with a particular consideration of the promise and possible negative effects of new digital technologies. French military academy instructor Gerard de Boisboissel considers the contemporary digital transformation of his country's military and proposes ways to ensure its maximum effectiveness. Retired American senior intelligence officer Leslie Gruis takes the long historical view, examining parallels between the effects of the current technological revolution and the transformation wrought by the invention of the printing press. Columbia University research scholar Michael Klipstein and coauthor Peter Chuzie analyze the potential offered for intelligence collection by the Internet of Things. And British academic Craig Stanley-Adamson explores the lessons that may be drawn from the relationship between Israel and its neighbors in the first decade post 9/11, arguing that it was characterized by a surprising degree of cooperation in the security realm that may, given auspicious circumstances, be repeated in the future.

Game Theory for Security and Risk Management - From Theory to Practice (Hardcover, 1st ed. 2018): Stefan Rass, Stefan Schauer Game Theory for Security and Risk Management - From Theory to Practice (Hardcover, 1st ed. 2018)
Stefan Rass, Stefan Schauer
R3,687 Discovery Miles 36 870 Ships in 10 - 15 working days

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dala Sealing Wax - Metallic Assorted (4…
R167 Discovery Miles 1 670
Machine Learning - A Practical Approach…
Rodrigo F Mello, Moacir Antonelli Ponti Hardcover R2,929 Discovery Miles 29 290
Lana's Reading Log - My First 200 Books…
Martha Day Zschock Hardcover R412 Discovery Miles 4 120
Principles Of Building Sustainable…
Fulufhelo A. Sithole Paperback R280 R259 Discovery Miles 2 590
Esteban's Reading Log - My First 200…
Martha Day Zschock Hardcover R412 Discovery Miles 4 120
Behavioral Finance - Psychology…
Richard Deaves, Lucy Ackert Hardcover R1,359 R1,259 Discovery Miles 12 590
Statistical Disclosure Control for…
Matthias Templ Hardcover R2,936 Discovery Miles 29 360
Redemption - 2017 Tales from the Writers…
Bernie Dowling, Vera M Murray, … Hardcover R833 Discovery Miles 8 330
Walking in London - Park, heath and…
Peter Aylmer Paperback R446 R402 Discovery Miles 4 020
The Judgment of Jerusalem - Predicted in…
William Patton Paperback R524 Discovery Miles 5 240

 

Partners