0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (612)
  • R500+ (5,094)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Ethical Digital Technology in Practice (Paperback): Simon Rogerson Ethical Digital Technology in Practice (Paperback)
Simon Rogerson
R1,664 Discovery Miles 16 640 Ships in 10 - 15 working days

Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students

Partially Homomorphic Encryption (Hardcover, 1st ed. 2021): Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger Partially Homomorphic Encryption (Hardcover, 1st ed. 2021)
Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger
R3,324 Discovery Miles 33 240 Ships in 18 - 22 working days

This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik; Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years partially and fully homomorphic encryption algorithms have been proposed and researchers have addressed issues related to their formulation, arithmetic, efficiency and security. Formidable efficiency barriers remain, but we now have a variety of algorithms that can be applied to various private computation problems in healthcare, finance and national security, and studying these functions may help us to understand the difficulties ahead. The book is valuable for researchers and graduate students in Computer Science, Engineering, and Mathematics who are engaged with Cryptology.

Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback): Josh More,... Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback)
Josh More, Anthony Stieber, Chris Liu
R857 Discovery Miles 8 570 Ships in 10 - 15 working days

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

Cybersecurity and High-Performance Computing Environments - Integrated Innovations, Practices, and Applications (Hardcover):... Cybersecurity and High-Performance Computing Environments - Integrated Innovations, Practices, and Applications (Hardcover)
Kuan-Ching Li, Nitin Sukhija, Elizabeth Bautista, Jean-Luc Gaudiot
R3,391 Discovery Miles 33 910 Ships in 10 - 15 working days

Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments. Covers the groundbreaking and emergent solutions that utilize the power of the HPC environments to study and understand the emergent multifaceted anomalous and malicious characteristics.

Social Engineering Penetration Testing - Executing Social Engineering Pen Tests, Assessments and Defense (Paperback): Gavin... Social Engineering Penetration Testing - Executing Social Engineering Pen Tests, Assessments and Defense (Paperback)
Gavin Watson, Andrew Mason, Richard Ackroyd
R1,045 Discovery Miles 10 450 Ships in 10 - 15 working days

Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, "Social Engineering Penetration Testing" gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks.

The authors of "Social Engineering Penetration Testing "show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
Understand how to plan and execute an effective social engineering assessment Learn how to configure and use the open-source tools available for the social engineer Identify parts of an assessment that will most benefit time-critical engagements Learn how to design target scenarios, create plausible attack situations, and support various attack vectors with technology Create an assessment report, then improve defense measures in response to test results"

Cyber Security and IT Infrastructure Protection (Paperback, New): John Vacca Cyber Security and IT Infrastructure Protection (Paperback, New)
John Vacca
R1,037 Discovery Miles 10 370 Ships in 10 - 15 working days

This book serves as a security practitioner s guide to today s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.

Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.

Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding Chapter Review Questions/Exercises and Case Studies Ancillaries: Solutions Manual; slide package; figure files

This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions"

Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012 (Hardcover, 2012... Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012 (Hardcover, 2012 ed.)
Jong Hyuk (James) Park, Jongsung Kim, Deqing Zou, Yang Sun Lee
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services.
The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.
The ITCS-12 is the next event in a series of highly successful International Conference on Information Technology Convergence and Services(ITCS-11), previously held in Gwangju, Korea on October, 2011.

Cyber-Physical Systems - A Comprehensive Guide (Hardcover): Nonita Sharma, L K Awasthi, Monika Mangla, K.P. Sharma, Rohit Kumar Cyber-Physical Systems - A Comprehensive Guide (Hardcover)
Nonita Sharma, L K Awasthi, Monika Mangla, K.P. Sharma, Rohit Kumar
R4,643 Discovery Miles 46 430 Ships in 10 - 15 working days

Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective, underlying theories, modelling, and the applications of Cyber Physical Systems (CPS). It aims to cover all topics ranging from discussion of ru-diments of the system, efficient management, to recent research challenges and issues. Editors aim to present the book in a self-sufficient manner and to achieve this, the book has been edited to include all the aspects of CPS. The book fo-cuses on the concept map of CPS including latest technological interventions; issues, challenges, and the integration of CPS with IoT & Big Data Analytics. This aims to bring together unique contributions on cyber-physical systems research and education with applications in industrial, agriculture, and medical domains. The main aim of the book is to provide a roadmap to the latest advancements to provide optimal solutions in the field of CPS. Features * Coverage of rudiments of the subject * Discussion of recent advancements in the associated field * Considers an audience of diverse domains * Suitable for students (both UG and PG level) and researchers in the field of CPS This book aims to present the emergence of Cyber Physical Systems in response to revolutionary advancements in IoT. While discussing the associated challenges, it also endeavors to devise efficient models which are competent to address these challenges. This book aims to cater to researchers and academicians working in the related field of CPS.

Introduction to the Cyber Ranges (Hardcover): Bishwajeet Pandey, Shabeer Ahmad Introduction to the Cyber Ranges (Hardcover)
Bishwajeet Pandey, Shabeer Ahmad
R3,506 Discovery Miles 35 060 Ships in 10 - 15 working days

Introduction to the Cyber-Ranges aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing cyber ranges in leading urban sectors like military, academic and commercial. * Provides foundational know-how of Cyber Ranges, their types, roles * Focuses on architectural design * Presents a comparison between emulation and simulation Cyber Ranges * Discusses various use cases of exiting cyber ranges in Military, Academics and Commercial arenas

Digital Health Transformation with Blockchain and Artificial Intelligence (Hardcover): Chinmay Chakraborty Digital Health Transformation with Blockchain and Artificial Intelligence (Hardcover)
Chinmay Chakraborty
R3,666 Discovery Miles 36 660 Ships in 10 - 15 working days

The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector. The population has been overcoming the COVID-19 period; therefore, we need to establish intelligent digital healthcare systems using various emerging technologies like Blockchain and Artificial Intelligence. Internet of Medical Things is the technological revolution that has included the element of "smartness" in the healthcare industry and also identifying, monitoring, and informing service providers about the patient's clinical information with faster delivery of care services. This book highlights the important issues i.e. (a) How Internet of things can be integrated with the healthcare ecosystem for better diagnostics, monitoring, and treatment of the patients, (b) Artificial Intelligence for predictive and preventive healthcare systems, (c) Blockchain for managing healthcare data to provide transparency, security, and distributed storage, and (d) Effective remote diagnostics and telemedicine approach for developing smart care. The book encompasses chapters belong to the blockchain, Artificial Intelligence, and Big health data technologies. Features: Blockchain and internet of things in healthcare systems Secure Digital Health Data Management in Internet of Things Public Perception towards AI-Driven Healthcare Security, privacy issues and challenges in adoption of smart digital healthcare Big data analytics and Internet of things in the pandemic era Clinical challenges for digital health revolution Artificial intelligence for advanced healthcare Future Trajectory of Healthcare with Artificial Intelligence 9 Parkinson disease pre-diagnosis using smart technologies Emerging technologies to combat the COVID-19 Machine Learning and Internet of Things in Digital Health Transformation Effective Remote Healthcare and Telemedicine Approaches Legal implication of blockchain technology in public health This Book on "Digital Health Transformation with Blockchain and Artificial Intelligence" aims at promoting and facilitating exchanges of research knowledge and findings across different disciplines on the design and investigation of secured healthcare data analytics. It can also be used as a textbook for a Masters course in security and biomedical engineering. This book will also present new methods for the medical data analytics, blockchain technology, and diagnosis of different diseases to improve the quality of life in general, and better integration into digital healthcare.

5G and Beyond - The Future of IoT (Hardcover): Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak 5G and Beyond - The Future of IoT (Hardcover)
Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak
R3,935 Discovery Miles 39 350 Ships in 10 - 15 working days

1) This book presents a two-fold approach to the topic. On one hand it discusses the fundamentals and theoretical concepts of 5G with respect to the IoT, and on the other hand it showcases some impactful and trending research in this field. Clearly, IoT is an interdisciplinary field and therefore this book would be useful to different stakeholders related to mobile communications and IoT networking architecture. 2) IoT is one of the most trending topics worldwide and 5G is coming into force across the world. Hence there would be demand for this topic 3) As compared to competition, the proposed book has updated content. It is written completely with the consideration of 5G inclusion worldwide in 2020, state-of-the-art research across the globe presented in diverse chapters, dual approach of conceptual and research/implementational perspectives put together.

Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.): Ehab Al-Shaer Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.)
Ehab Al-Shaer
R3,204 Discovery Miles 32 040 Ships in 18 - 22 working days

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.

Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Hardcover):... Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Hardcover)
Ravi Das
R3,510 Discovery Miles 35 100 Ships in 10 - 15 working days

The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given equipment that has not been properly secured or must use personal devices to perform office work. The proliferation of videoconferencing has brought about new types of cyber-attacks. When the pandemic struck, many organizations found they had no, or old and unworkable, business continuity and disaster recovery plans. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic reviews the COVID-19 pandemic and related information security issues. It then develops a series of lessons learned from this reviews and explains how organizations can prepare for the next global mega disaster. The following presents some of the key lessons learned: The lack of vetting for third party suppliers and vendors The lack of controls surrounding data privacy, especially as it relates to the personal identifiable information (PPI) data sets The intermingling of home and corporate networks The lack of a secure remote workforce The emergence of supply chain attacks (e.g., Solar Winds) To address the issues raised in these lessons learned, CISOs and their security teams must have tools and methodologies in place to address the following: The need for incident response, disaster recovery, and business continuity plans The need for effective penetration testing The importance of threat hunting The need for endpoint security The need to use the SOAR model The importance of a zero-trust framework This book provides practical coverage of these topics to prepare information security professionals for any type of future disaster. The COVID-19 pandemic has changed the entire world to unprecedented and previously unimaginable levels. Many businesses, especially in the United States, were completely caught off guard, and they had no concrete plans put into place, from a cybersecurity standpoint, for how to deal with this mega disaster. This how-to book fully prepares CIOs, CISOs, and their teams for the next disaster, whether natural or manmade, with the various lessons that have been learned thus far from the COVID-19 pandemic.

Secure Data Science - Integrating Cyber Security and Data Science (Hardcover): Murat Kantarcioglu, Latifur Khan, Bhavani... Secure Data Science - Integrating Cyber Security and Data Science (Hardcover)
Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham
R3,540 Discovery Miles 35 400 Ships in 10 - 15 working days

Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. This is because the novel data science techniques being developed have applications in solving such cyber security problems as intrusion detection, malware analysis, and insider threat detection. However, the data science techniques being applied not only for cyber security but also for every application area-including healthcare, finance, manufacturing, and marketing-could be attacked by malware. Furthermore, due to the power of data science, it is now possible to infer highly private and sensitive information from public data, which could result in the violation of individual privacy. This is the first such book that provides a comprehensive overview of integrating both cyber security and data science and discusses both theory and practice in secure data science. After an overview of security and privacy for big data services as well as cloud computing, this book describes applications of data science for cyber security applications. It also discusses such applications of data science as malware analysis and insider threat detection. Then this book addresses trends in adversarial machine learning and provides solutions to the attacks on the data science techniques. In particular, it discusses some emerging trends in carrying out trustworthy analytics so that the analytics techniques can be secured against malicious attacks. Then it focuses on the privacy threats due to the collection of massive amounts of data and potential solutions. Following a discussion on the integration of services computing, including cloud-based services for secure data science, it looks at applications of secure data science to information sharing and social media. This book is a useful resource for researchers, software developers, educators, and managers who want to understand both the high level concepts and the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in secure data science. Furthermore, this book provides numerous references that would be helpful for the reader to get more details about secure data science.

Security Software Development - Assessing and Managing Security Risks (Hardcover, New): Cissp Douglas A. Ashbaugh Security Software Development - Assessing and Managing Security Risks (Hardcover, New)
Cissp Douglas A. Ashbaugh
R2,899 Discovery Miles 28 990 Ships in 9 - 17 working days

Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. The latest line of defense is to build security features into software as it is being developed. Drawing from the author's extensive experience as a developer, Secure Software Development: Assessing and Managing Security Risks illustrates how software application security can be best, and most cost-effectively, achieved when developers monitor and regulate risks early on, integrating assessment and management into the development life cycle. This book identifies the two primary reasons for inadequate security safeguards: Development teams are not sufficiently trained to identify risks; and developers falsely believe that pre-existing perimeter security controls are adequate to protect newer software. Examining current trends, as well as problems that have plagued software security for more than a decade, this useful guide: Outlines and compares various techniques to assess, identify, and manage security risks and vulnerabilities, with step-by-step instruction on how to execute each approach Explains the fundamental terms related to the security process Elaborates on the pros and cons of each method, phase by phase, to help readers select the one that best suits their needs Despite decades of extraordinary growth in software development, many open-source, government, regulatory, and industry organizations have been slow to adopt new application safety controls, hesitant to take on the added expense. This book improves understanding of the security environment and the need for safety measures. It shows readers how to analyze relevant threats to their applications and then implement time- and money-saving techniques

Cybersecurity - A Practical Engineering Approach (Hardcover): Henrique M. D. Santos Cybersecurity - A Practical Engineering Approach (Hardcover)
Henrique M. D. Santos
R2,280 Discovery Miles 22 800 Ships in 10 - 15 working days

Uses a modular structure, oriented to solve several small-sized cybersecurity problems, each workable in about two weeks with a hands-on approach Evolves from the experience of educating students for more than ten years, following the same principle Includes tutorial work that guides students through a development model aiming to stimulate specific education for non-functional requirements implementation Integrates well-known multimedia resources aiming to explain background concepts and to familiarize students with technological tools. Provides many examples generated from actual occurrences, including those generated by European and NATO experiences

Cybercrime and Cybersecurity in the Global South - Concepts, Strategies and Frameworks for Greater Resilience (Hardcover):... Cybercrime and Cybersecurity in the Global South - Concepts, Strategies and Frameworks for Greater Resilience (Hardcover)
Charlette Donalds, Corlane Barclay, Kweku-Muata Osei-Bryson
R3,381 Discovery Miles 33 810 Ships in 10 - 15 working days

The Global South is recognized as one of the fastest growing regions in terms of Internet population as well as the region that accounts for the majority of Internet users. However, It cannot be overlooked that with increasing connectivity to and dependence on Internet-based platforms and services, so too is the potential increased for information and cybersecurity threats and attacks. Further, it has long been established that micro, small, and medium enterprises (MSMEs) play a key role in national economies, serving as important drivers of economic growth in Global South economies. Yet, little is known about information security, cybersecurity and cybercrime issues and strategies contextualized to these developing economies and MSMEs. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience examines the prevalence, nature, trends and impacts of cyber-related incidents on Global South economies. It further explores cybersecurity challenges, potential threats, and risks likely faced by MSMEs and governments of the Global South. A major thrust of this book is to offer tools, techniques, and legislative frameworks that can improve the information, data, and cybersecurity posture of Global South governments and MSMEs. It also provides evidence-based best practices and strategies relevant to the business community and general Information Communication Technology (ICT) users in combating and preventing cyber-related incidents. Also examined in this book are case studies and experiences of the Global South economies that can be used to enhance students' learning experience. Another important feature of this book is that it outlines a research agenda to advance the scholarship of information and cybersecurity in the Global South. Features: Cybercrime in the Caribbean Privacy and security management Cybersecurity compliance behaviour Developing solutions for managing cybersecurity risks Designing an effective cybersecurity programme in the organization for improved resilience The cybersecurity capability maturity model for sustainable security advantage Cyber hygiene practices for MSMEs A cybercrime classification ontology

IT Convergence and Security 2017 - Volume 2 (Hardcover, 1st ed. 2018): Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek IT Convergence and Security 2017 - Volume 2 (Hardcover, 1st ed. 2018)
Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek
R4,645 Discovery Miles 46 450 Ships in 10 - 15 working days

This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field. It explores how IT convergence and security issues are core to most current research, industrial and commercial activities and consists of contributions covering topics including machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful Inter national Conferences on IT Convergence and Security, previously held in Prague, Czech Republic (2016), Kuala Lumpur, Malaysia (2015), Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).

X-Ways Forensics Practitioner's Guide (Paperback, New): Brett Shavers, Eric Zimmerman X-Ways Forensics Practitioner's Guide (Paperback, New)
Brett Shavers, Eric Zimmerman
R1,274 Discovery Miles 12 740 Ships in 10 - 15 working days

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis.

In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches.

With X-Ways Forensics Practitioner's Guide, you will be able to use X-Ways Forensics to its fullest potential without any additional training. The book takes you from installation to the most advanced features of the software. Once you are familiar with the basic components of X-Ways, the authors demonstrate never-before-documented features using real life examples and information on how to present investigation results. The book culminates with chapters on reporting, triage and preview methods, as well as electronic discovery and cool X-Ways apps.
Provides detailed explanations of the complete forensic investigation processe using X-Ways Forensics.Goes beyond the basics: hands-on case demonstrations of never-before-documented features of X-Ways.Provides the best resource of hands-on information to use X-Ways Forensics.

Understanding Blockchain and Cryptocurrencies - A Primer for Implementing and Developing Blockchain Projects (Hardcover): Akira... Understanding Blockchain and Cryptocurrencies - A Primer for Implementing and Developing Blockchain Projects (Hardcover)
Akira Summers
R3,334 Discovery Miles 33 340 Ships in 18 - 22 working days

Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need. You have probably noticed that blockchains are growing in popularity. Governments are investigating Digital Currencies, supply chains are adopting Digital Ledgers, games makers and artists are developing NFTs (Non-Fungible Tokens), and new use-cases are emerging regularly. With such growth, many people will find themselves needing to understand how these technologies work. There will be new project teams, with technical leads managing blockchain projects and developers creating distributed applications. This book is great for them as it explains the concepts on which blockchain technologies are based, in simple terms. We will discuss and explain topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms encryption, vulnerabilities, and much more. The structures and principles described will be relevant for developers and managers alike, and will be demonstrated through relevant examples throughout the text. If you are looking to understand this exciting new technology, this is the book for you.

Cloud Storage Forensics (Paperback): Darren Quick, Ben Martini, Raymond Choo Cloud Storage Forensics (Paperback)
Darren Quick, Ben Martini, Raymond Choo
R1,366 Discovery Miles 13 660 Ships in 10 - 15 working days

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing.

"Cloud Storage Forensics" presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.
Learn to use the methodology and tools from the first evidenced-based cloud forensic framework Case studies provide detailed tools for analysis of cloud storage devices using popular cloud storage services Includes coverage of the legal implications of cloud storage forensic investigations Discussion of the future evolution of cloud storage and its impact on digital forensics

Intelligence Management - Knowledge Driven Frameworks for Combating Terrorism and Organized Crime (Hardcover, Edition.): Babak... Intelligence Management - Knowledge Driven Frameworks for Combating Terrorism and Organized Crime (Hardcover, Edition.)
Babak Akhgar, Simeon Yates
R2,669 Discovery Miles 26 690 Ships in 18 - 22 working days

The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime. The chapters address the linkage between: law enforcement; developments in information and communication technologies and key ideas about the management of data, information, knowledge and intelligence. The work is conducted by a number of international academic and industrial research groups, law enforcement agencies, and end users. Section 1 presents four chapters that address the details, outcomes, user needs and background theoretical ideas behind a large-scale research aand development project in this domain (The Odyssey Project). This project explored the challenges of establishing a Pan-European ballistics and crime information intelligence network. It represents an example of the type of system that is likely to become commonly used by Law Enforcement Agencies in the near future. Many of the challenges are not technical but organisational, legal, economic, social and political. Sections 2 and 3 therefore present wider commentaries. Section 2 explores other research and development projects that attempt to exploit the power of contemporary ICT systems to support Law Enforcement Agencies in many aspects of their work including investigations, data analysis and presentation, identification, training and crime prevention. Section 3 takes a look at the social and organisational issues around aspects of crime prevention, crime detection and policing - with a view to the role of information and communication technologies in these contexts.

Security in IoT - The Changing Perspective (Hardcover): Rituparna Chaki, Debdutta Barman Roy Security in IoT - The Changing Perspective (Hardcover)
Rituparna Chaki, Debdutta Barman Roy
R2,453 Discovery Miles 24 530 Ships in 10 - 15 working days

The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. This book explores the variegated perspectives of security in the complex context of Internet of Things. It also aims to present the changing face of security, from the ubiquitous networks comprising of WSN as the lowest layer, to the enabler apps working as bridge between the users and the complex IoT system. It takes a closer look at the different types of security schemes required to fit in the heterogeneous nature of IoT network., whilst the readers are also introduced to basic attacks targeting an IoT network, as well as specific types of security schemes worked out by researchers across different countries. As Programmable Logic Controllers (PLC) play a fundamental role in Industrial Control Systems, since they provide various functionalities of physical tools by collecting data from input devices and sending commands to output devices, this book includes a discussion on the security considerations of extending a PLC-based system with IoT capabilities. Other advanced topics include: The machine ethics aspects in the IoT system; the Intrusion detection of WSN; and the methods of securing the user from privacy breaches due to the overprivileged IoT apps. This book will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.

Citizen Privacy Framework - Case of a Fuzzy-based Recommender System for Political Participation (Hardcover, 1st ed. 2022):... Citizen Privacy Framework - Case of a Fuzzy-based Recommender System for Political Participation (Hardcover, 1st ed. 2022)
Aigul Kaskina
R2,637 Discovery Miles 26 370 Ships in 18 - 22 working days

This book presents the concept of a fuzzy-based recommender system for user account privacy settings that can be used for citizen participation on online political platforms. The elaborated components are exemplarily based on the needs of a political platform implemented during the presidential election in Ecuador. The book readdresses the issue of privacy paradox demonstrating that, indeed, users' actual decisions of being private in most cases diverge with their initial privacy intentions. The two concepts presented in the book - the citizen privacy profile framework and the prototype fuzzy-based privacy settings recommender system - can be adapted by different organizations such as government institutions, NGOs, or private online service providers to meet their specific needs. The book will be of interest to researchers and practitioners in the areas of usage modeling, privacy, system design, and for service providers in eDemocracy.

Cyber Threat Intelligence (Hardcover, 1st ed. 2018): Ali Dehghantanha, Mauro Conti, Tooska Dargahi Cyber Threat Intelligence (Hardcover, 1st ed. 2018)
Ali Dehghantanha, Mauro Conti, Tooska Dargahi
R4,412 Discovery Miles 44 120 Ships in 10 - 15 working days

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Fast This Way - Burn Fat, Heal…
Dave Asprey Paperback R432 R393 Discovery Miles 3 930
Becoming Bulletproof - Life Lessons From…
Evy Poumpouras Paperback R318 R290 Discovery Miles 2 900
Robust Chaos And Its Applications
Zeraoulia Elhadj, Julien Clinton Sprott Hardcover R4,075 Discovery Miles 40 750
Quit Like A Woman - The Radical Choice…
Holly Whitaker Paperback R494 R441 Discovery Miles 4 410
Iteration of Rational Functions…
Alan F. Beardon Paperback R2,288 Discovery Miles 22 880
Introduction to Discrete Dynamical…
M. Martelli Hardcover R4,675 Discovery Miles 46 750
The Systems Thinker - Dynamic Systems…
Albert Rutherford Hardcover R673 Discovery Miles 6 730
The Theory of Chaotic Attractors
Brian R. Hunt, Judy A. Kennedy, … Hardcover R2,778 Discovery Miles 27 780
Overthinking Mind A Counterintuitive…
Yuka Bishop Hardcover R656 Discovery Miles 6 560
Get Untamed: The Journal - How To Quit…
Glennon Doyle Hardcover  (1)
R376 Discovery Miles 3 760

 

Partners