0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (210)
  • R250 - R500 (607)
  • R500+ (5,103)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover): Balwinder Raj, Brij B. Gupta, Jeetendra... Advanced Circuits and Systems for Healthcare and Security Applications (Hardcover)
Balwinder Raj, Brij B. Gupta, Jeetendra Singh
R3,080 Discovery Miles 30 800 Ships in 10 - 15 working days

Unique selling point: * Contains electronics device, Circuits, systems as well as applications of Integrated Circuits in healthcare and security never before considered Core audience: * Researchers and post graduates Place in the market: * Includes key new finding of electronic devices for Security Applications, and Integrated Circutis for healthcare and security Applications with advanced

Cyberpredators and Their Prey (Paperback): Lauren R Shapiro Cyberpredators and Their Prey (Paperback)
Lauren R Shapiro
R1,628 Discovery Miles 16 280 Ships in 10 - 15 working days

Portrays material through multidisciplinary lens of psychology, criminal justice, law, and security Provides consistent, practical information about online criminals and victims Compares online to offline versions of the same crime Discusses adequacy of current laws for prosecuting cybercriminals Considers elements of the online environment that foster criminal activity Describes social engineering techniques Considers the role of intimate partner violence in cybercrimes Reviews 21st century skills needed to educate and protect potential targets

Cyber Security - Threats and Responses for Government and Business (Hardcover): Jack Caravelli, Nigel Jones Cyber Security - Threats and Responses for Government and Business (Hardcover)
Jack Caravelli, Nigel Jones
R1,899 Discovery Miles 18 990 Ships in 10 - 15 working days

This timely and compelling book presents a broad study of all key cyber security issues of the highest interest to government and business as well as their implications. This comprehensive work focuses on the current state of play regarding cyber security threats to government and business, which are imposing unprecedented costs and disruption. At the same time, it aggressively takes a forward-looking approach to such emerging industries as automobiles and appliances, the operations of which are becoming more closely tied to the internet. Revolutionary developments will have security implications unforeseen by manufacturers, and the authors explore these in detail, drawing on lessons from overseas as well as the United States to show how nations and businesses can combat these threats. The book's first section describes existing threats and their consequences. The second section identifies newer cyber challenges across an even broader spectrum, including the internet of things. The concluding section looks at policies and practices in the United States, United Kingdom, and elsewhere that offer ways to mitigate threats to cyber security. Written in a nontechnical, accessible manner, the book will appeal to a diverse audience of policymakers, business leaders, cyber security experts, and interested general readers. Takes a broad approach to the problems of cyber security, covering every important issue related to the threats cyber security poses to government and business Provides detailed coverage of the political, financial, data protection, privacy, and reputational problems caused by cyber attacks Offers a forward-looking approach, discussing emerging trends that will bring new challenges to those charged with enhancing cyber security Makes insightful suggestions into how nations and businesses can take steps to enhance their cyber security

Effective Security Management (Hardcover, 6th edition): Charles A. Sennewald, Curtis Baillie Effective Security Management (Hardcover, 6th edition)
Charles A. Sennewald, Curtis Baillie
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. The author, Charles Sennewald, brings common sense, wisdom, and humor to this bestselling introduction to security management that is ideal for both new and experienced security managers. The sixth edition of this classic professional reference work on the topic includes newly updated and expanded coverage of topics such as the integration of security executive into the business, background checks and hiring procedures, involvement in labor disputes, organized crime, and the role of social media.

Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (Hardcover): Anand Handa, Rohit Negi,... Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (Hardcover)
Anand Handa, Rohit Negi, Sandeep Kumar Shukla
R2,853 Discovery Miles 28 530 Ships in 10 - 15 working days

Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The Editors have developed multiple projects which can help in developing cybersecurity solution architectures and the use of the right tools from the open-source software domain. This book has 8 chapters describing these projects in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment. This book also demonstrates work related to malware analysis using machine learning and implementation of honeypots, network Intrusion Detection Systems in a security operation center environment. It is essential reading for cybersecurity professionals and advanced students.

Cybercrime - Protecting your business, your family and yourself (Paperback): Todd Wade Cybercrime - Protecting your business, your family and yourself (Paperback)
Todd Wade
R888 Discovery Miles 8 880 Ships in 18 - 22 working days

This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, falls victim to cybercrime. With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.

Cyber Security Threats and Challenges Facing Human Life (Hardcover): Hari Vasudevan, Surya S Durbha, Antonis Michalas,... Cyber Security Threats and Challenges Facing Human Life (Hardcover)
Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, …
R3,085 Discovery Miles 30 850 Ships in 10 - 15 working days

Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain. This book offers detailed analysis of effective countermeasures and mitigations. The financial sector, healthcare, digital manufacturing, and social media are some of the important areas in which cyber-attacks are frequent and cause great harm. Hence, special emphasis is given to the study and analysis of cyber security challenges and countermeasures in those four important areas. KEY FEATURES * Discusses the prominence of cyber security in human life * Discusses the significance of cyber security in the post-COVID-19 world * Emphasizes the issues, challenges, and applications of cyber security mitigation methods in business and different sectors * Provides comphrension of the impact of cyber security threats and challenges in digital manufacturing and the internet of things environment * Offers understanding of the impact of big data breaches and future trends in data security This book is primarily aimed at undergraduate students, graduate students, researchers, academicians, and professionals who are interested in exploring their research and knowledge in cyber security domain.

Cross-Site Scripting Attacks - Classification, Attack, and Countermeasures (Paperback): Bb Gupta, Pooja Chaudhary Cross-Site Scripting Attacks - Classification, Attack, and Countermeasures (Paperback)
Bb Gupta, Pooja Chaudhary
R696 Discovery Miles 6 960 Ships in 10 - 15 working days

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security.

Security Analytics for the Internet of Everything (Paperback): Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan Security Analytics for the Internet of Everything (Paperback)
Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included. The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.

Smart Card Security - Applications, Attacks, and Countermeasures (Paperback): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Paperback)
Brij B. Gupta, Megha Quamara
R658 Discovery Miles 6 580 Ships in 10 - 15 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Vulnerability Management (Paperback, 2nd edition): Park Foreman Vulnerability Management (Paperback, 2nd edition)
Park Foreman
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Cybersecurity and Privacy in Cyber Physical Systems (Paperback): Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim... Cybersecurity and Privacy in Cyber Physical Systems (Paperback)
Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader's awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.

Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Hardcover, 1st ed. 2020): Jiangxing Wu Cyberspace Mimic Defense - Generalized Robust Control and Endogenous Security (Hardcover, 1st ed. 2020)
Jiangxing Wu
R5,304 Discovery Miles 53 040 Ships in 18 - 22 working days

This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.

Understanding Cybersecurity - Emerging Governance and Strategy (Hardcover): Gary Schaub, Jr. Understanding Cybersecurity - Emerging Governance and Strategy (Hardcover)
Gary Schaub, Jr.
R3,994 Discovery Miles 39 940 Ships in 10 - 15 working days

Over the last decade, the internet and cyber space has had a phenomenal impact on all parts of society, from media and politics to defense and war. Governments around the globe have started to develop cyber security strategies, governance and operations to consider cyberspace as an increasingly important and contentious international issue. This book provides the reader with the most up-to-date survey of the cyberspace security practices and processes in two accessible parts; governance and operations. Suitable for a wide-ranging audience, from professionals, analysts, military personnel, policy-makers and academics, this collection offers all sides of cyberspace issues, implementation and strategy for the future. Gary Schaub is also the co-editor of "Private Military and Security Contractors" (2016), click link for full details: https://rowman.com/ISBN/9781442260214/Private-Military-and-Security-Contractors-Controlling-the-Corporate-Warrior

Security of Cyber-Physical Systems - Vulnerability and Impact (Hardcover, 1st ed. 2020): Hadis Karimipour, Pirathayini... Security of Cyber-Physical Systems - Vulnerability and Impact (Hardcover, 1st ed. 2020)
Hadis Karimipour, Pirathayini Srikantha, Hany Farag, Jin Wei-Kocsis
R4,730 Discovery Miles 47 300 Ships in 18 - 22 working days

This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today's technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.

Machine Learning, Blockchain, and Cyber Security in  Smart Environments - Application and Challenges (Hardcover): Sarvesh... Machine Learning, Blockchain, and Cyber Security in Smart Environments - Application and Challenges (Hardcover)
Sarvesh Tanwar, Sumit Badotra, Ajay Rana
R3,933 Discovery Miles 39 330 Ships in 10 - 15 working days

Machine Learning, Cyber Security, and Blockchain in Smart Environment: Application and Challenges provides far-reaching insights into the recent techniques forming the backbone of smart environments, and addresses the vulnerabilities that give rise to the challenges in real-word implementation. The book focuses on the benefits related to the emerging applications such as machine learning, blockchain and cyber security. Key Features: Introduces the latest trends in the fields of machine learning, blockchain and cyber security Discusses the fundamentals, challenges and architectural overviews with concepts Explores recent advancements in machine learning, blockchain, and cyber security Examines recent trends in emerging technologies This book is primarily aimed at graduates, researchers, and professionals working in the areas of machine learning, blockchain, and cyber security.

Network Security Essentials: Applications and Standards, Global Edition (Paperback, 6th edition): William Stallings Network Security Essentials: Applications and Standards, Global Edition (Paperback, 6th edition)
William Stallings
R1,154 Discovery Miles 11 540 Ships in 4 - 6 working days

For courses in Corporate, Computer and Network Security . Network Securities Essentials: Applications and Standards introduces students to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organisations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks. The 6th Edition covers the expanding developments in the cryptography and network security disciplines, giving students a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards.

Cloud Storage Security - A Practical Guide (Paperback): Aaron Wheeler, Michael Winburn Cloud Storage Security - A Practical Guide (Paperback)
Aaron Wheeler, Michael Winburn
R787 Discovery Miles 7 870 Ships in 10 - 15 working days

Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.

Code Breaking in the Pacific (Hardcover, 2014 ed.): Peter Donovan, John Mack Code Breaking in the Pacific (Hardcover, 2014 ed.)
Peter Donovan, John Mack
R4,008 Discovery Miles 40 080 Ships in 10 - 15 working days

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource."

Security and Resilience of Cyber Physical Systems (Hardcover): Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia Security and Resilience of Cyber Physical Systems (Hardcover)
Krishan Kumar, Sunny Behal, Abhinav Bhandari, Sajal Bhatia
R2,790 Discovery Miles 27 900 Ships in 10 - 15 working days

In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber physical systems. Hackers and bad guys are planning various kinds of attacks on daily basis on these systems. This book addresses the various security and privacy issues involved in the cyber physical system. There is need to explore the interdisciplinary analysis to ensure the resilience of these systems including different types of cyber threats to these systems. The book highlights the importance of security in preventing, detecting, characterizing and mitigating different types of cyber threats on CPS. The book offers a simple to understand various organized chapters related to the CPS and their security for graduate students, faculty, research scholars and industry professionals. The book offers comprehensive coverage of the most essential topics, including: Cyber Physical Systems and Industrial Internet of Things (IIoT) Role of Internet of Things and their security issues in Cyber Physical Systems. Role of Big data analytic to develop real time solution for CPS. DDoS attacks and their solutions in CPS. Emulator Mininet for simulating CPS. Spark-based DDoS Classification System for Cyber-Physical Systems

Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework... Implementing Cybersecurity - A Guide to the National Institute of Standards and Technology Risk Management Framework (Paperback)
Anne Kohnke, Ken Sigler, Dan Shoemaker
R1,454 Discovery Miles 14 540 Ships in 9 - 17 working days

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues (Paperback): Ryan Ko, Raymond Choo The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues (Paperback)
Ryan Ko, Raymond Choo
R2,331 Discovery Miles 23 310 Ships in 10 - 15 working days

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.

Computer Security, Privacy and Politics - Current Issues, Challenges and Solutions (Hardcover): Ramesh Subramanian Computer Security, Privacy and Politics - Current Issues, Challenges and Solutions (Hardcover)
Ramesh Subramanian
R2,621 Discovery Miles 26 210 Ships in 18 - 22 working days

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spyware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism - all of these have a profound effect on our daily computing operations and habits, with major political and social implications.""Computer Security, Privacy and Politics"" connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this Premier Reference Source compiles high quality, timely content on such cutting-edge topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.

Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover): Ishaani Priyadarshini, Chase Cotton Cybersecurity - Ethics, Legal, Risks, and Policies (Hardcover)
Ishaani Priyadarshini, Chase Cotton
R3,634 Discovery Miles 36 340 Ships in 10 - 15 working days

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well-its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.

Security and Privacy for Next-Generation Wireless Networks (Hardcover, 1st ed. 2019): Sheng Zhong, Hong Zhong, Xinyi Huang,... Security and Privacy for Next-Generation Wireless Networks (Hardcover, 1st ed. 2019)
Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, …
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
Smart Cities Cybersecurity and Privacy
Danda B. Rawat, Kayhan Zrar Ghafoor Paperback R2,553 Discovery Miles 25 530
Investigations and the Art of the…
Inge Sebyan Black, Lawrence Fennelly Paperback R1,661 Discovery Miles 16 610
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Guide to Computer Forensics and…
Amelia Phillips, Bill Nelson, … Paperback R1,345 R1,248 Discovery Miles 12 480
Security of Networks and Services in an…
Daphne Tuncer, Robert Koch, … Hardcover R1,344 Discovery Miles 13 440
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300

 

Partners