0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (210)
  • R250 - R500 (607)
  • R500+ (5,105)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Designing and Building Security Operations Center (Paperback): David Nathans Designing and Building Security Operations Center (Paperback)
David Nathans
R1,125 R1,028 Discovery Miles 10 280 Save R97 (9%) Ships in 10 - 15 working days

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly. Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.

Digital Transformation in Cloud Computing - Top-level Design, Architecture, and Applications (Hardcover): Alibaba Cloud... Digital Transformation in Cloud Computing - Top-level Design, Architecture, and Applications (Hardcover)
Alibaba Cloud Intelligence GTS; Contributions by Zhang Zhou
R4,577 Discovery Miles 45 770 Ships in 10 - 15 working days

With the rapid development of cloud computing and digital transformation, well-designed cloud-based architecture is always in urgent need. Illustrated by project cases from the Chinese technology company Alibaba, this book elaborates how to design a cloud-based application system and build them on the cloud. Cloud computing is far from being just a resource provider; it offers database, storage and container services that can help to leverage key advantages for business growth. Based on this notion, authors from the Alibaba Cloud Global Technology Services introduce new concepts and cutting-edge technology in the field, including cloud-native, high-availability and disaster tolerance design on cloud, business middle office, data middle office, and enterprise digital transformation. Resting upon Alibaba's years of practice and achievements in the field of cloud technology, the volume also elucidates the methodology and practice solutions of digital construction, including methodology, product tools, technical processes, architecture design, cloud application capacity assessment and optimization, etc. The book will appeal to researchers, students, and especially IT practitioners, professionals, and managers interested in cloud computing, digital transformation, cloud migration, business middle office, data middle office, as well as the Alibaba Cloud itself.

Ransomware and Cybercrime (Hardcover): Andrew Jenkinson Ransomware and Cybercrime (Hardcover)
Andrew Jenkinson
R3,499 Discovery Miles 34 990 Ships in 10 - 15 working days

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need-no, we must demand-change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Policing Transnational Organized Crime and Corruption - Exploring the Role of Communication Interception Technology (Hardcover,... Policing Transnational Organized Crime and Corruption - Exploring the Role of Communication Interception Technology (Hardcover, New)
M. Congram, P. Bell, Mark Lauchs
R1,748 Discovery Miles 17 480 Ships in 10 - 15 working days

Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organised crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises.Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organised crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing.Policing Transnational Organised Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.

Cyber Reconnaissance, Surveillance and Defense (Paperback): Robert Shimonski Cyber Reconnaissance, Surveillance and Defense (Paperback)
Robert Shimonski
R1,276 Discovery Miles 12 760 Ships in 10 - 15 working days

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.

Security and Privacy Trends in Cloud Computing and Big Data (Hardcover): Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi... Security and Privacy Trends in Cloud Computing and Big Data (Hardcover)
Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba
R2,569 Discovery Miles 25 690 Ships in 10 - 15 working days

It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, high computation power, and distributed capability to support processing of big data. In such an integrated environment the security and privacy concerns involved in both technologies become combined. This book discusses these security and privacy issues in detail and provides necessary insights into cloud computing and big data integration. It will be useful in enhancing the body of knowledge concerning innovative technologies offered by the research community in the area of cloud computing and big data. Readers can get a better understanding of the basics of cloud computing, big data, and security mitigation techniques to deal with current challenges as well as future research opportunities.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,244 Discovery Miles 12 440 Ships in 10 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Phishing Detection Using Content-Based Image Classification (Hardcover): Shekhar Khandelwal, Rik Das Phishing Detection Using Content-Based Image Classification (Hardcover)
Shekhar Khandelwal, Rik Das
R1,747 Discovery Miles 17 470 Ships in 10 - 15 working days

Phishing Detection Using Content-Based Image Classification is an invaluable resource for any deep learning and cybersecurity professional and scholar trying to solve various cybersecurity tasks using new age technologies like Deep Learning and Computer Vision. With various rule-based phishing detection techniques at play which can be bypassed by phishers, this book provides a step-by-step approach to solve this problem using Computer Vision and Deep Learning techniques with significant accuracy. The book offers comprehensive coverage of the most essential topics, including: Programmatically reading and manipulating image data Extracting relevant features from images Building statistical models using image features Using state-of-the-art Deep Learning models for feature extraction Build a robust phishing detection tool even with less data Dimensionality reduction techniques Class imbalance treatment Feature Fusion techniques Building performance metrics for multi-class classification task Another unique aspect of this book is it comes with a completely reproducible code base developed by the author and shared via python notebooks for quick launch and running capabilities. They can be leveraged for further enhancing the provided models using new advancement in the field of computer vision and more advanced algorithms.

Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback): Mark Tarallo Modern Management and Leadership - Best Practice Essentials with CISO/CSO Applications (Paperback)
Mark Tarallo
R1,183 Discovery Miles 11 830 Ships in 10 - 15 working days

In one modest-sized volume, this book offers three valuable sets of knowledge. First, it provides best practice guidance on virtually every large-scale task a modern manager may be involved in-from recruiting and hiring to onboarding and leading teams, and from employee engagement and retention to performance management and working with difficult employees. Second, it explains the essential concepts and practice of a range of effective leadership styles-including (but not limited to) servant leadership, crisis leadership, change agent leadership, and diversity and inclusion leadership. Third, it offers brief case studies from select CISOs and CSOs on how these management and leadership principles and practices play out in real-life workplace situations. The best practice essentials provided throughout this volume will empower aspiring leaders and also enable experienced managers to take their leadership to the next level. Many if not most CISOs and other leaders have had very little, if any, formal training in management and leadership. The select few that have such training usually obtained it through academic courses that take a theoretical, broad brush approach. In contrast, this book provides much actionable guidance in the nitty-gritty tasks that managers must do every day. Lack of management practical knowledge puts CISOs and CSOs at a disadvantage vis-a-vis other executives in the C-suite. They risk being pigeonholed as "security cops" rather than respected business leaders. Many articles on these subjects published in the press are too incomplete and filled with bad information. And combing through the few high-quality sources that are out there, such as Harvard Business Publishing, can take hundreds of dollars in magazine subscription and book purchase fees and weeks or months of reading time. This book puts all the essential information into your hands through a series of concise chapters authored by an award-winning writer.

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Paperback): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Paperback)
Ann M. Butera
R1,238 Discovery Miles 12 380 Ships in 10 - 15 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

Partially Homomorphic Encryption (Hardcover, 1st ed. 2021): Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger Partially Homomorphic Encryption (Hardcover, 1st ed. 2021)
Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger
R3,324 Discovery Miles 33 240 Ships in 18 - 22 working days

This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik; Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years partially and fully homomorphic encryption algorithms have been proposed and researchers have addressed issues related to their formulation, arithmetic, efficiency and security. Formidable efficiency barriers remain, but we now have a variety of algorithms that can be applied to various private computation problems in healthcare, finance and national security, and studying these functions may help us to understand the difficulties ahead. The book is valuable for researchers and graduate students in Computer Science, Engineering, and Mathematics who are engaged with Cryptology.

Integrated Security Systems Design - A Complete Reference for Building Enterprise-Wide Digital Security Systems (Hardcover, 2nd... Integrated Security Systems Design - A Complete Reference for Building Enterprise-Wide Digital Security Systems (Hardcover, 2nd edition)
Thomas L. Norman
R1,335 Discovery Miles 13 350 Ships in 10 - 15 working days

Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential and how to lead the project to success. With new and expanded coverage of network architecture, physical security information management (PSIM) systems, camera technologies, and integration with the Business Information Management Network, Integrated Security Systems Design, 2nd Edition, shows how to improve a security program's overall effectiveness while avoiding pitfalls and potential lawsuits.

Online Security for the Business Traveler (Paperback): Deborah Gonzalez Online Security for the Business Traveler (Paperback)
Deborah Gonzalez
R360 Discovery Miles 3 600 Ships in 10 - 15 working days

Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today s high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and Google Glass. Each of these devices offers new levels of productivity and efficiency, but they also become the weak link in the security chain: if a device is lost or stolen during travel, the resulting data breach can put the business in danger of physical, financial, and reputational loss. "

Online Security for the Business Traveler" provides an overview of this often overlooked problem, explores cases highlighting specific security issues, and offers practical advice on what to do to ensure business security while traveling and engaging in online activity. It is an essential reference guide for any travelling business person or security professional.
Chapters are organized by travel stages for easy reference, including planning, departure, arrival, and returning homeTouches on the latest technologies that today's business traveler is usingUses case studies to highlight specific security issues and identify areas for improved risk mitigation"

Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback): Josh More,... Breaking into Information Security - Crafting a Custom Career Path to Get the Job You Really Want (Paperback)
Josh More, Anthony Stieber, Chris Liu
R857 Discovery Miles 8 570 Ships in 10 - 15 working days

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

Cybersecurity and High-Performance Computing Environments - Integrated Innovations, Practices, and Applications (Hardcover):... Cybersecurity and High-Performance Computing Environments - Integrated Innovations, Practices, and Applications (Hardcover)
Kuan-Ching Li, Nitin Sukhija, Elizabeth Bautista, Jean-Luc Gaudiot
R3,391 Discovery Miles 33 910 Ships in 10 - 15 working days

Represents a substantial research contribution to state-of-the-art solutions for addressing the threats to Confidentiality, Integrity, and Availability (CIA Triad) in high-performance computing (HPC) environments. Covers the groundbreaking and emergent solutions that utilize the power of the HPC environments to study and understand the emergent multifaceted anomalous and malicious characteristics.

Social Engineering Penetration Testing - Executing Social Engineering Pen Tests, Assessments and Defense (Paperback): Gavin... Social Engineering Penetration Testing - Executing Social Engineering Pen Tests, Assessments and Defense (Paperback)
Gavin Watson, Andrew Mason, Richard Ackroyd
R1,045 Discovery Miles 10 450 Ships in 10 - 15 working days

Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, "Social Engineering Penetration Testing" gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks.

The authors of "Social Engineering Penetration Testing "show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.
Understand how to plan and execute an effective social engineering assessment Learn how to configure and use the open-source tools available for the social engineer Identify parts of an assessment that will most benefit time-critical engagements Learn how to design target scenarios, create plausible attack situations, and support various attack vectors with technology Create an assessment report, then improve defense measures in response to test results"

Cyber Security and IT Infrastructure Protection (Paperback, New): John Vacca Cyber Security and IT Infrastructure Protection (Paperback, New)
John Vacca
R1,037 Discovery Miles 10 370 Ships in 10 - 15 working days

This book serves as a security practitioner s guide to today s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.

Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.

Written with instructors and students in mind, this book includes methods of analysis and problem-solving techniques through hands-on exercises and worked examples as well as questions and answers and the ability to implement practical solutions through real-life case studies. For example, the new format includes the following pedagogical elements: Checklists throughout each chapter to gauge understanding Chapter Review Questions/Exercises and Case Studies Ancillaries: Solutions Manual; slide package; figure files

This format will be attractive to universities and career schools as well as federal and state agencies, corporate security training programs, ASIS certification, etc.
Chapters by leaders in the field on theory and practice of cyber security and IT infrastructure protection, allowing the reader to develop a new level of technical expertiseComprehensive and up-to-date coverage of cyber security issues allows the reader to remain current and fully informed from multiple viewpointsPresents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions"

Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012 (Hardcover, 2012... Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012 (Hardcover, 2012 ed.)
Jong Hyuk (James) Park, Jongsung Kim, Deqing Zou, Yang Sun Lee
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services.
The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.
The ITCS-12 is the next event in a series of highly successful International Conference on Information Technology Convergence and Services(ITCS-11), previously held in Gwangju, Korea on October, 2011.

Cyber-Physical Systems - A Comprehensive Guide (Hardcover): Nonita Sharma, L K Awasthi, Monika Mangla, K.P. Sharma, Rohit Kumar Cyber-Physical Systems - A Comprehensive Guide (Hardcover)
Nonita Sharma, L K Awasthi, Monika Mangla, K.P. Sharma, Rohit Kumar
R4,643 Discovery Miles 46 430 Ships in 10 - 15 working days

Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective, underlying theories, modelling, and the applications of Cyber Physical Systems (CPS). It aims to cover all topics ranging from discussion of ru-diments of the system, efficient management, to recent research challenges and issues. Editors aim to present the book in a self-sufficient manner and to achieve this, the book has been edited to include all the aspects of CPS. The book fo-cuses on the concept map of CPS including latest technological interventions; issues, challenges, and the integration of CPS with IoT & Big Data Analytics. This aims to bring together unique contributions on cyber-physical systems research and education with applications in industrial, agriculture, and medical domains. The main aim of the book is to provide a roadmap to the latest advancements to provide optimal solutions in the field of CPS. Features * Coverage of rudiments of the subject * Discussion of recent advancements in the associated field * Considers an audience of diverse domains * Suitable for students (both UG and PG level) and researchers in the field of CPS This book aims to present the emergence of Cyber Physical Systems in response to revolutionary advancements in IoT. While discussing the associated challenges, it also endeavors to devise efficient models which are competent to address these challenges. This book aims to cater to researchers and academicians working in the related field of CPS.

Introduction to the Cyber Ranges (Hardcover): Bishwajeet Pandey, Shabeer Ahmad Introduction to the Cyber Ranges (Hardcover)
Bishwajeet Pandey, Shabeer Ahmad
R3,506 Discovery Miles 35 060 Ships in 10 - 15 working days

Introduction to the Cyber-Ranges aims to provide substantial theoretical knowhow on cyber ranges, their architectural design, along with a case study of existing cyber ranges in leading urban sectors like military, academic and commercial. * Provides foundational know-how of Cyber Ranges, their types, roles * Focuses on architectural design * Presents a comparison between emulation and simulation Cyber Ranges * Discusses various use cases of exiting cyber ranges in Military, Academics and Commercial arenas

Digital Health Transformation with Blockchain and Artificial Intelligence (Hardcover): Chinmay Chakraborty Digital Health Transformation with Blockchain and Artificial Intelligence (Hardcover)
Chinmay Chakraborty
R3,666 Discovery Miles 36 660 Ships in 10 - 15 working days

The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector. The population has been overcoming the COVID-19 period; therefore, we need to establish intelligent digital healthcare systems using various emerging technologies like Blockchain and Artificial Intelligence. Internet of Medical Things is the technological revolution that has included the element of "smartness" in the healthcare industry and also identifying, monitoring, and informing service providers about the patient's clinical information with faster delivery of care services. This book highlights the important issues i.e. (a) How Internet of things can be integrated with the healthcare ecosystem for better diagnostics, monitoring, and treatment of the patients, (b) Artificial Intelligence for predictive and preventive healthcare systems, (c) Blockchain for managing healthcare data to provide transparency, security, and distributed storage, and (d) Effective remote diagnostics and telemedicine approach for developing smart care. The book encompasses chapters belong to the blockchain, Artificial Intelligence, and Big health data technologies. Features: Blockchain and internet of things in healthcare systems Secure Digital Health Data Management in Internet of Things Public Perception towards AI-Driven Healthcare Security, privacy issues and challenges in adoption of smart digital healthcare Big data analytics and Internet of things in the pandemic era Clinical challenges for digital health revolution Artificial intelligence for advanced healthcare Future Trajectory of Healthcare with Artificial Intelligence 9 Parkinson disease pre-diagnosis using smart technologies Emerging technologies to combat the COVID-19 Machine Learning and Internet of Things in Digital Health Transformation Effective Remote Healthcare and Telemedicine Approaches Legal implication of blockchain technology in public health This Book on "Digital Health Transformation with Blockchain and Artificial Intelligence" aims at promoting and facilitating exchanges of research knowledge and findings across different disciplines on the design and investigation of secured healthcare data analytics. It can also be used as a textbook for a Masters course in security and biomedical engineering. This book will also present new methods for the medical data analytics, blockchain technology, and diagnosis of different diseases to improve the quality of life in general, and better integration into digital healthcare.

5G and Beyond - The Future of IoT (Hardcover): Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak 5G and Beyond - The Future of IoT (Hardcover)
Parag Chatterjee, Robin Singh Bhadoria, Yadunath Pathak
R3,935 Discovery Miles 39 350 Ships in 10 - 15 working days

1) This book presents a two-fold approach to the topic. On one hand it discusses the fundamentals and theoretical concepts of 5G with respect to the IoT, and on the other hand it showcases some impactful and trending research in this field. Clearly, IoT is an interdisciplinary field and therefore this book would be useful to different stakeholders related to mobile communications and IoT networking architecture. 2) IoT is one of the most trending topics worldwide and 5G is coming into force across the world. Hence there would be demand for this topic 3) As compared to competition, the proposed book has updated content. It is written completely with the consideration of 5G inclusion worldwide in 2020, state-of-the-art research across the globe presented in diverse chapters, dual approach of conceptual and research/implementational perspectives put together.

Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.): Ehab Al-Shaer Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.)
Ehab Al-Shaer
R3,204 Discovery Miles 32 040 Ships in 18 - 22 working days

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.

Security Software Development - Assessing and Managing Security Risks (Hardcover, New): Cissp Douglas A. Ashbaugh Security Software Development - Assessing and Managing Security Risks (Hardcover, New)
Cissp Douglas A. Ashbaugh
R2,899 Discovery Miles 28 990 Ships in 9 - 17 working days

Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instances, traditional firewalls and other conventional controls can no longer get the job done. The latest line of defense is to build security features into software as it is being developed. Drawing from the author's extensive experience as a developer, Secure Software Development: Assessing and Managing Security Risks illustrates how software application security can be best, and most cost-effectively, achieved when developers monitor and regulate risks early on, integrating assessment and management into the development life cycle. This book identifies the two primary reasons for inadequate security safeguards: Development teams are not sufficiently trained to identify risks; and developers falsely believe that pre-existing perimeter security controls are adequate to protect newer software. Examining current trends, as well as problems that have plagued software security for more than a decade, this useful guide: Outlines and compares various techniques to assess, identify, and manage security risks and vulnerabilities, with step-by-step instruction on how to execute each approach Explains the fundamental terms related to the security process Elaborates on the pros and cons of each method, phase by phase, to help readers select the one that best suits their needs Despite decades of extraordinary growth in software development, many open-source, government, regulatory, and industry organizations have been slow to adopt new application safety controls, hesitant to take on the added expense. This book improves understanding of the security environment and the need for safety measures. It shows readers how to analyze relevant threats to their applications and then implement time- and money-saving techniques

Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Paperback):... Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Paperback)
Ravi Das
R1,290 Discovery Miles 12 900 Ships in 10 - 15 working days

The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given equipment that has not been properly secured or must use personal devices to perform office work. The proliferation of videoconferencing has brought about new types of cyber-attacks. When the pandemic struck, many organizations found they had no, or old and unworkable, business continuity and disaster recovery plans. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic reviews the COVID-19 pandemic and related information security issues. It then develops a series of lessons learned from this reviews and explains how organizations can prepare for the next global mega disaster. The following presents some of the key lessons learned: The lack of vetting for third party suppliers and vendors The lack of controls surrounding data privacy, especially as it relates to the personal identifiable information (PPI) data sets The intermingling of home and corporate networks The lack of a secure remote workforce The emergence of supply chain attacks (e.g., Solar Winds) To address the issues raised in these lessons learned, CISOs and their security teams must have tools and methodologies in place to address the following: The need for incident response, disaster recovery, and business continuity plans The need for effective penetration testing The importance of threat hunting The need for endpoint security The need to use the SOAR model The importance of a zero-trust framework This book provides practical coverage of these topics to prepare information security professionals for any type of future disaster. The COVID-19 pandemic has changed the entire world to unprecedented and previously unimaginable levels. Many businesses, especially in the United States, were completely caught off guard, and they had no concrete plans put into place, from a cybersecurity standpoint, for how to deal with this mega disaster. This how-to book fully prepares CIOs, CISOs, and their teams for the next disaster, whether natural or manmade, with the various lessons that have been learned thus far from the COVID-19 pandemic.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Learning Resources Time Tracker Mini
R599 R554 Discovery Miles 5 540
Croxley Abacus - 12 x 10 Plastic Beads…
R87 Discovery Miles 870
EDX Education Number Lines - Empty (15…
R239 Discovery Miles 2 390
Anthony Peters Multi-Coloured Coconut…
R184 Discovery Miles 1 840
EDX Education Student Dry Erase Board…
R731 Discovery Miles 7 310
EDX Education 2-Color Plastic Counters…
R130 R98 Discovery Miles 980
EDX Education Multi-Coloured Plastic…
R259 R135 Discovery Miles 1 350
EDX Education Dominoes - Jumbo Number…
R399 R363 Discovery Miles 3 630
EDX Education Activity Cards for Wild…
R89 R75 Discovery Miles 750
Gigo Base Ten Linking Set with Container…
R345 Discovery Miles 3 450

 

Partners