0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (613)
  • R500+ (5,095)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.): Jun Li, Peter Reiher, Gerald J. Popek Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.)
Jun Li, Peter Reiher, Gerald J. Popek
R2,741 Discovery Miles 27 410 Ships in 18 - 22 working days

In 1775, Paul Revere, the folk hero of the American Revolution, galloped wildly on horseback through small towns to warn American colonists that the British were coming. In today's Internet age, how do we warn vast numbers of computers about impending cyber attacks?

Rapid and widespread dissemination of security updates throughout the Internet would be invaluable for many purposes, including sending early-warning signals, distributing new virus signatures, updating certificate revocation lists, dispatching event information for intrusion detection systems, etc. However, notifying a large number of machines securely, quickly, and with high assurance is very challenging. Such a system must compete with the propagation of threats, handle complexities in large-scale environments, address interruption attacks toward dissemination, and also secure itself.

Disseminating Security Updates at Internet Scale describes a new system, "Revere," that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of "Revere" gathered using a large-scale oriented approach. These measurements suggest that "Revere" can deliver security updates at the required scale, speed and resiliency for a reasonable cost.

Disseminating Security Updates at Internet Scale is designed to meet the needs of researchers and practitioners in industry and graduate students in computer science. This book will also be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by "Revere." The "Revere" solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.

Mobility Data Management and Exploration (Hardcover, 2014 ed.): Nikos Pelekis, Yannis Theodoridis Mobility Data Management and Exploration (Hardcover, 2014 ed.)
Nikos Pelekis, Yannis Theodoridis
R1,967 Discovery Miles 19 670 Ships in 10 - 15 working days

This text integrates different mobility data handling processes, from database management to multi-dimensional analysis and mining, into a unified presentation driven by the spectrum of requirements raised by real-world applications. It presents a step-by-step methodology to understand and exploit mobility data: collecting and cleansing data, storage in Moving Object Database (MOD) engines, indexing, processing, analyzing and mining mobility data. Emerging issues, such as semantic and privacy-aware querying and mining as well as distributed data processing, are also covered. Theoretical presentation is smoothly interchanged with hands-on exercises and case studies involving an actual MOD engine. The authors are established experts who address both theoretical and practical dimensions of the field but also present valuable prototype software. The background context, clear explanations and sample exercises make this an ideal textbook for graduate students studying database management, data mining and geographic information systems.

Security and Data Reliability in Cooperative Wireless Networks (Paperback): Emad  Hassan Security and Data Reliability in Cooperative Wireless Networks (Paperback)
Emad Hassan
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybrid Self-Healing scheme to enhance the confidentiality of the data collected by UWSN. It ends with a proposal called Self-Healing Cluster Controlled Mobility (SH-CCM) scheme based on hybrid cooperation between both Proactive and Reactive peers and the sick sensors at both network and cluster levels to guarantee the security in UWSN.

The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications - The Intelligent Cyber Shield for Smart Cities... The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications - The Intelligent Cyber Shield for Smart Cities (Paperback)
Rocky Termanini
R1,504 Discovery Miles 15 040 Ships in 10 - 15 working days

Present anti-virus technologies do not have the symmetrical weaponry to defeat massive DDoS attacks on smart cities. Smart cities require a new set of holistic and AI-centric cognitive technology, such as autonomic components that replicate the human immune system, and a smart grid that connects all IoT devices. The book introduces Digital Immunity and covers the human immune system, massive distributed attacks (DDoS) and the future generations cyber attacks, the anatomy and critical success factors of smart city, Digital Immunity and the role of the Smart Grid, how Digital Immunity defends the smart city and annihilates massive malware, and Digital Immunity to combat global cyber terrorism.

Empirical Research for Software Security - Foundations and Experience (Paperback): Lotfi Ben Othmane, Martin Gilje Jaatun,... Empirical Research for Software Security - Foundations and Experience (Paperback)
Lotfi Ben Othmane, Martin Gilje Jaatun, Edgar Weippl
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback): Sinjini Mitra, Mikhail Gofman Biometrics in a Data Driven World - Trends, Technologies, and Challenges (Paperback)
Sinjini Mitra, Mikhail Gofman
R1,498 Discovery Miles 14 980 Ships in 10 - 15 working days

Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics. The first section of the book discusses the fundamentals of biometrics and provides an overview of common biometric modalities, namely face, fingerprints, iris, and voice. It also discusses the history of the field, and provides an overview of emerging trends and opportunities. The second section of the book introduces readers to a wide range of biometric applications. The next part of the book is dedicated to the discussion of case studies of biometric modalities currently used on mobile applications. As smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, biometrics-based authentication is emerging as an integral part of protecting mobile devices against unauthorized access, while enabling new and highly popular applications, such as secure online payment authorization. The book concludes with a discussion of future trends and opportunities in the field of biometrics, which will pave the way for advancing research in the area of biometrics, and for the deployment of biometric technologies in real-world applications. The book is designed for individuals interested in exploring the contemporary applications of biometrics, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level security courses will also find this book to be an especially useful companion.

Location Privacy in Wireless Sensor Networks (Paperback): Ruben Rios, Javier Lopez, Jorge Cuellar Location Privacy in Wireless Sensor Networks (Paperback)
Ruben Rios, Javier Lopez, Jorge Cuellar
R1,462 Discovery Miles 14 620 Ships in 10 - 15 working days

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor networks. Location Privacy in Wireless Sensor Networks focuses on location privacy, by which an attacker might determine the source and destination of communications with simple techniques. This poses a serious threat as the attacker might use this information to reach the assets or individuals being monitored or even to destroy or compromise the whole network. This book will aid in the protection against this serious privacy threat.

Security and Privacy in Internet of Things (IoTs) - Models, Algorithms, and Implementations (Paperback): Fei Hu Security and Privacy in Internet of Things (IoTs) - Models, Algorithms, and Implementations (Paperback)
Fei Hu
R1,517 Discovery Miles 15 170 Ships in 10 - 15 working days

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.

Securing Cyber-Physical Systems (Paperback): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Paperback)
Al-Sakib Khan Pathan
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Statistical Methods in Computer Security (Paperback): William W.S. Chen Statistical Methods in Computer Security (Paperback)
William W.S. Chen
R1,571 Discovery Miles 15 710 Ships in 10 - 15 working days

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.

Socioeconomic and Legal Implications of Electronic Intrusion (Hardcover): Dionysios Politis Socioeconomic and Legal Implications of Electronic Intrusion (Hardcover)
Dionysios Politis
R4,955 Discovery Miles 49 550 Ships in 18 - 22 working days

In the information society, electronic intrusion has become a new form of trespassing often causing significant problems and posing great risks for individuals and businesses. ""Socioeconomic and Legal Implications of Electronic Intrusion"" focuses on abusive and illegal practices of penetration in the sphere of private communications. A leading international reference source within the field, this book provides legal and political practitioners, academicians, and intrusion researchers with expert knowledge into global theft and spam perspectives, identity theft and fraud, and electronic crime issues.

Security and Organization within IoT and Smart Cities (Paperback): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Paperback)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Secure, Resilient, and Agile Software Development (Paperback): Mark Merkow Secure, Resilient, and Agile Software Development (Paperback)
Mark Merkow
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised... Advances in Digital Forensics XV - 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019, Revised Selected Papers (Hardcover, 1st ed. 2019)
Gilbert Peterson, Sujeet Shenoi
R1,435 Discovery Miles 14 350 Ships in 18 - 22 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XV describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: forensic models, mobile and embedded device forensics, filesystem forensics, image forensics, and forensic techniques. This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of fourteen edited papers from the Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2019. Advances in Digital Forensics XV is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback): Alan Tang Privacy in Practice - Establish and Operationalize a Holistic Data Privacy Program (Paperback)
Alan Tang
R1,414 Discovery Miles 14 140 Ships in 10 - 15 working days

1. Equip professionals with holistic and structured knowledge regarding establishing and implementing privacy framework and program. 2. Gain practical guidance, tools, and templates to manage complex privacy and data protection subjects with cross-functional teams. 3. Gain the knowledge in measuring privacy program and operating it in a more efficient and effective manner.

Security in Cyberspace - Targeting Nations, Infrastructures, Individuals (Hardcover): Giampiero Giacomello Security in Cyberspace - Targeting Nations, Infrastructures, Individuals (Hardcover)
Giampiero Giacomello
R4,312 Discovery Miles 43 120 Ships in 10 - 15 working days

Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking.

Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence (Hardcover, 1st ed. 2022):... Explainable Artificial Intelligence for Cyber Security - Next Generation Artificial Intelligence (Hardcover, 1st ed. 2022)
Mohiuddin Ahmed, Sheikh Rabiul Islam, Adnan Anwar, Nour Moustafa, Al-Sakib Khan Pathan
R2,221 Discovery Miles 22 210 Ships in 10 - 15 working days

This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms which work as a black box as of today. To understand the algorithms better and interpret the complex networks of these algorithms, XAI plays a vital role. In last few decades, we have embraced AI in our daily life to solve a plethora of problems, one of the notable problems is cyber security. In coming years, the traditional AI algorithms are not able to address the zero-day cyber attacks, and hence, to capitalize on the AI algorithms, it is absolutely important to focus more on XAI. Hence, this book serves as an excellent reference for those who are working in cyber security and artificial intelligence.

Penetration Tester's Open Source Toolkit (Paperback, 4th edition): Jeremy Faircloth Penetration Tester's Open Source Toolkit (Paperback, 4th edition)
Jeremy Faircloth
R1,302 Discovery Miles 13 020 Ships in 10 - 15 working days

Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.

The Information Systems Security Officer's Guide - Establishing and Managing a Cyber Security Program (Paperback, 3rd... The Information Systems Security Officer's Guide - Establishing and Managing a Cyber Security Program (Paperback, 3rd edition)
Gerald L. Kovacich
R1,369 Discovery Miles 13 690 Ships in 10 - 15 working days

The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents practical advice on establishing, managing, and evaluating a successful information protection program in a corporation or government agency, covering everything from effective communication to career guidance for the information security officer. The book outlines how to implement a new plan or evaluate an existing one, and is especially targeted to those who are new to the topic. It is the definitive resource for learning the key characteristics of an effective information systems security officer (ISSO), and paints a comprehensive portrait of an ISSO's duties, their challenges, and working environments, from handling new technologies and threats, to performing information security duties in a national security environment.

Open Source Software for Digital Forensics (Hardcover, 2010 ed.): Ewa Huebner, Stefano Zanero Open Source Software for Digital Forensics (Hardcover, 2010 ed.)
Ewa Huebner, Stefano Zanero
R4,076 Discovery Miles 40 760 Ships in 18 - 22 working days

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution.

Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited volume is a collection of contributions from researchers and practitioners world wide.

Open Source Software for Digital Forensics is designed for advanced level students and researchers in computer science as a secondary text and reference book. Computer programmers, software developers, and digital forensics professionals will also find this book to be a valuable asset.

Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March... Critical Infrastructure Protection XIV - 14th IFIP WG 11.10 International Conference, ICCIP 2020, Arlington, VA, USA, March 16-17, 2020, Revised Selected Papers (Hardcover, 1st ed. 2020)
Jason Staggs, Sujeet Shenoi
R2,701 Discovery Miles 27 010 Ships in 18 - 22 working days

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover)
Steve King; Edited by Kiren Chaudry
R3,361 Discovery Miles 33 610 Ships in 10 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Securing the Cloud - Security Strategies for the Ubiquitous Data Center (Paperback): Curtis Franklin Jr., Brian Chee Securing the Cloud - Security Strategies for the Ubiquitous Data Center (Paperback)
Curtis Franklin Jr., Brian Chee
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.

Reforming European Data Protection Law (Hardcover, 2015 ed.): Serge Gutwirth, Ronald Leenes, Paul De Hert Reforming European Data Protection Law (Hardcover, 2015 ed.)
Serge Gutwirth, Ronald Leenes, Paul De Hert
R4,397 R3,596 Discovery Miles 35 960 Save R801 (18%) Ships in 10 - 15 working days

This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, the book looks at preventing privacy risks and harms through impact assessments. It contains discussions on the tools and methodologies for impact assessments as well as case studies. The book then goes on to cover the purported trade-off between privacy and security, ways to support privacy and data protection, and the controversial right to be forgotten, which offers individuals a means to oppose the often persistent digital memory of the web. Written during the process of the fundamental revision of the current EU data protection law by the Data Protection Package proposed by the European Commission, this interdisciplinary book presents both daring and prospective approaches. It will serve as an insightful resource for readers with an interest in privacy and data protection.

Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Paperback, 2nd edition)
Nick Catrantzos
R1,830 Discovery Miles 18 300 Ships in 10 - 15 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
AI-Driven Intelligent Models for…
Samala Nagaraj, Korupalli V Rajesh Kumar Hardcover R6,199 Discovery Miles 61 990
CABology: Value of Cloud, Analytics and…
Nitin Upadhyay Hardcover R2,082 R1,722 Discovery Miles 17 220
A Guide To SQL
Philip Pratt, Hassan Afyouni, … Paperback R1,256 R1,167 Discovery Miles 11 670
The Handbook on Socially Interactive…
Birgit Lugrin, Catherine Pelachaud, … Hardcover R2,272 Discovery Miles 22 720
Computer Intrusion Detection and Network…
David J Marchette Hardcover R2,696 Discovery Miles 26 960
African Artificial Intelligence…
Mark Nasila Paperback R350 R312 Discovery Miles 3 120
Learning Journals - A Handbook for…
Jennifer A Moon Paperback R1,349 Discovery Miles 13 490
Cryptocurrency Trading - How to Make…
Devan Hansel Paperback R361 Discovery Miles 3 610
Pro Oracle Database 10g RAC on Linux…
J Dyke, S. Shaw Hardcover R1,587 Discovery Miles 15 870
Data Wrangling - Using Pandas, SQL, and…
Oswald Campesato Paperback R1,103 R932 Discovery Miles 9 320

 

Partners