![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Network security
This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyber space in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertainties. Within this, it highlights four key debates that encapsulate the complexities and paradoxes of cyber security politics from a Western perspective - how much political influence states can achieve via cyber operations and what context factors condition the (limited) strategic utility of such operations; the role of emerging digital technologies and how the dynamics of the tech innovation process reinforce the fragmentation of the governance space; how states attempt to uphold stability in cyberspace and, more generally, in their strategic relations; and how the shared responsibility of state, economy, and society for cyber security continues to be re-negotiated in an increasingly trans-sectoral and transnational governance space. This book will be of much interest to students of cyber security, global governance, technology studies, and international relations. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need. You have probably noticed that blockchains are growing in popularity. Governments are investigating Digital Currencies, supply chains are adopting Digital Ledgers, games makers and artists are developing NFTs (Non-Fungible Tokens), and new use-cases are emerging regularly. With such growth, many people will find themselves needing to understand how these technologies work. There will be new project teams, with technical leads managing blockchain projects and developers creating distributed applications. This book is great for them as it explains the concepts on which blockchain technologies are based, in simple terms. We will discuss and explain topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms encryption, vulnerabilities, and much more. The structures and principles described will be relevant for developers and managers alike, and will be demonstrated through relevant examples throughout the text. If you are looking to understand this exciting new technology, this is the book for you.
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient. It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book Distills foundational knowledge and presents it in a concise manner that is easily assimilated Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including Threat categories, agents, and objectives Strategies and approaches deployed by various threat agents Predisposing risk factors in cybersecurity threat situations Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth. Who should use this book? Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare
The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient. It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book Distills foundational knowledge and presents it in a concise manner that is easily assimilated Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including Threat categories, agents, and objectives Strategies and approaches deployed by various threat agents Predisposing risk factors in cybersecurity threat situations Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth. Who should use this book? Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare
This book strives to take stock of current achievements and existing challenges in nuclear verification, identify the available information and gaps that can act as drivers for exploring new approaches to verification strategies and technologies. With the practical application of the systems concept to nuclear disarmament scenarios and other, non-nuclear verification fields, it investigates, where greater transparency and confidence could be achieved in pursuit of new national or international nonproliferation and arms reduction efforts. A final discussion looks at how, in the absence of formal government-to-government negotiations, experts can take practical steps to advance the technical development of these concepts.
The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that is yet to be addressed. To address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CRs include ensuring secure device operations and data transmission with advanced computing techniques. Successful development of CR systems will involve attainment of the following key objectives: Increasing the rate and capacity of CR-based networks How the power is utilized in CR hardware devices with CMOS circuits How the framework is needed in complex networks Vedic multipliers on CR networks Spatial analysis and clustering methods for traffic management To transmit a large volume of data like video compression Swarm optimization algorithms Resource sharing in peer-to-peer networking This book gathers the latest research works focusing on the issues, challenges, and solutions in the field of Cognitive Radio Networks, with various techniques. The chapters in this book will give solutions to the problems that Industry 4.0 faces, and will be an essential resource for scholars in all areas of the field.
This book provides step by step directions for organizations to adopt a security and compliance related architecture according to mandatory legal provisions and standards prescribed for their industry, as well as the methodology to maintain the compliances. It sets a unique mechanism for monitoring controls and a dashboard to maintain the level of compliances. It aims at integration and automation to reduce the fatigue of frequent compliance audits and build a standard baseline of controls to comply with the applicable standards and regulations to which the organization is subject. It is a perfect reference book for professionals in the field of IT governance, risk management, and compliance. The book also illustrates the concepts with charts, checklists, and flow diagrams to enable management to map controls with compliances.
This book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the electricity market, and cybersecurity standards that apply in that sector. He then offers a systematic approach to cybersecurity management, including new methods of cybersecurity assessment, cost evaluation and comprehensive defence. This monograph is suitable for practitioners, professionals, and researchers engaged in critical infrastructure protection.
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.
An easily digestible guide, Campus Emergency Preparedness: Meeting ICS and NIMS Compliance helps you develop and organize emergency operation plans. It incorporates the key components recommended by the Federal Emergency Management Agency (FEMA) and the US Department of Education and outlines the roles and responsibilities of campus personnel before, during, and after an emergency. Events covered include chemical spills, toxic gas releases, terrorist attacks, active shooter events, pandemics, floods, hurricanes, tornados, fires, and other natural or man-made hazards. The information in this book is extracted from FEMA and US Department of Education documents and training, as well as concepts and strategies from a cross-section of college and university emergency plans. These resources have been melded together to provide you with strategies for protecting, preventing, mitigating, responding, and recovering from threats and hazards that may occur at an institute of higher education. The book aids you in creating emergency response plans that comply with standards set by the ICS and NIMS. Ultimately, these are all-hazards strategies that can be applied to all phases of campus emergency management with efficient coordination among all levels of campus administration. Safety in higher education institution campuses is a critical issue today in the wake of several events in recent years. Campus Emergency Preparedness helps you work toward creating a campus environment that is as safe as possible for your students, faculty, and staff. It is a valuable source for anticipating and handling a broad range of emergencies.
Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics, including: Basic fundamentals of Cloud Computing Cloud security concepts, vulnerabilities, security standards and reference models Cloud security goals, key issues and privacy requirements Threat model, detailed taxonomy of cloud attacks, Attack feature analysis - case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools, LibVMI - case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model, attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook, for a semester course at undergraduate and post graduate level in Computer Science, Information Technology, Information Security, and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners, cloud security team, and the cloud security auditor as well. To get the most out of this book, the reader should have a working knowledge of various operating system environments, hypervisors, cloud computing fundamentals, programming languages like Python and a working knowledge of security tools.
This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know - how of the subject. Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security, all kind of network attacks, intention of an attacker, identification of attack, detection, its analysis, incident response, ethical issues, botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too. Features: Follows an outcome-based learning approach. A systematic overview of the state-of-the-art in network security, tools, Digital forensics. Differentiation among network security, computer forensics, network forensics and botnet forensics. Discussion on various cybercrimes, attacks and cyber terminologies. Discussion on network forensics process model. Network forensics tools and different techniques Network Forensics analysis through case studies. Discussion on evidence handling and incident response. System Investigations and the ethical issues on network forensics. This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication, Computer Science and Computer Engineering.
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations
This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.
Individuals wishing to attack a company s network have found a new path of least resistance the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user s machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible. The most current attacks are discussed along with their delivery
methods, such as browser exploitation, use of rich Internet
applications, and file format vulnerabilities. The severity of
these attacks is examined along with defences against them,
including antivirus and anti-spyware, intrusion detection systems,
and end-user education.
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In "Federated Identity Primer," Derrick Rountree Explains the concepts of digital identity Describes the technology behind and implementation of federated identity systems Helps you decide if federated identity is good for your system
or web service Learn about Internet authentication Learn about federated authentication Learn about ADFS 2.0 "
"Placing the Suspect Behind the Keyboard" is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with
high tech crime analysis in a manner that not only determines
elements of crimes, but also places the suspect at the keyboard.
This book is a first in combining investigative strategies of
digital forensics analysis processes alongside physical
investigative techniques in which the reader will gain a holistic
approach to their current and future cybercrime
investigations. Learn the tools and investigative principles of both physical and digital cybercrime investigations-and how they fit together to build a solid and complete case. Master the techniques of conducting a holistic investigation that combines both digital and physical evidence to track down the "suspect behind the keyboard." The only book to combine physical and digital investigative techniques. "
Online transaction has become an important part of the new economy and finance. At the same time, transaction payment fraud also presents an explosive trend.This unique compendium introduces risk control theories technologies of online transaction processes, and applies the traditional security technologies and advanced behavior authentication methods to the trustworthy guarantee of online transaction systems. The comprehensive volume also promotes the development of trustworthy online transaction theory and technologies.This useful reference text will benefit researchers in the field of computer science and technologies, as well as a research reference in the field of online transaction risk prevention and control.
Building a successful cybersecurity team is no longer optional. Cyberthreats evolve at a staggering pace, and effective cybersecurity operations depend on successful teams. Unfortunately, statistics continue to illustrate that employers are not finding the people they need. The Can. Trust. Will. system guides the C-Suite, HR professionals and talent acquisition to build unbeatable cybersecurity teams through advanced hiring processes and focused on-boarding programs. Additionally, this book details how successful cybersecurity ecosystems are best built and sustained, with expert analysis from high-level government officials, Fortune 500 CSOs and CISOs, risk managers, and even a few techies. Those already in the field (and newbies) will glean invaluable knowledge about how to find their most effective position within a cybersecurity ecosystem. In a tech-driven environment, cybersecurity is fundamentally a human problem: and the first step is to hire for the human element.
This book examines the context, motivation and current status of biometric systems based on the palmprint, with a specific focus on touchless and less-constrained systems. It covers new technologies in this rapidly evolving field and is one of the first comprehensive books on palmprint recognition systems. It discusses the research literature and the most relevant industrial applications of palmprint biometrics, including the low-cost solutions based on webcams. The steps of biometric recognition are described in detail, including acquisition setups, algorithms, and evaluation procedures. Constraints and limitations of current palmprint recognition systems are analyzed and discussed. The authors also introduce innovative methods for touchless and less-constrained palmprint recognition, with the aim to make palmprint biometrics easier to use in practical, daily-life applications, and overcome the typical constraints and limitations described. Touchless Palmprint Recognition Systems targets professionals and researchers working in biometrics, image processing and three-dimensional reconstruction. Advanced-level students studying biometrics and computer science will also find this material valuable as a secondary text book or reference.
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.
The Industry 4.0 revolution is changing the world around us. Artificial intelligence and machine learning, automation and robotics, big data, Internet of Things, augmented reality, virtual reality, and creativity are the tools of Industry 4.0. Improved collaboration is seen between smart systems and humans, which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4.0 Applications with Blockchain examines the role of IoT in Industry 4.0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications, architecture, technologies, tools, and programming languages. It then examines blockchain and cybersecurity, as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4.0 systems The evolution of the Industrial Internet of Things (IIoT), its proliferation and market share, and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT), including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications, including smart contracts, transferring financial instruments, and Public Key Infrastructure An overview of the structure and working of a blockchain, including the types, evolution, benefits, and applications of blockchain to industries A framework of technologies designed to shield networks, computers, and data from malware, vulnerabilities, and unauthorized activities An explanation of the automation system employed in industries along with its classification, functionality, flexibility, limitations, and applications
The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.
This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure. The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives. |
You may like...
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R7,962
Discovery Miles 79 620
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, …
Hardcover
R6,797
Discovery Miles 67 970
Research Anthology on Business Aspects…
Information Resources Management Association
Hardcover
R11,427
Discovery Miles 114 270
Deep Learning Strategies for Security…
K Martin Sagayam, Bharat Bhushan, …
Hardcover
R5,452
Discovery Miles 54 520
Cyber-Physical Threat Intelligence for…
John Soldatos, Isabel Praca, …
Hardcover
R3,378
Discovery Miles 33 780
|