0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (176)
  • R250 - R500 (204)
  • R500+ (848)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Convergence of Blockchain, AI, and IoT - Concepts and Challenges (Hardcover): R. Indrakumari, Vijanth Sagayan Asirvadam, R.... Convergence of Blockchain, AI, and IoT - Concepts and Challenges (Hardcover)
R. Indrakumari, Vijanth Sagayan Asirvadam, R. Lakshmana Kumar, B. Balusamy
R4,491 Discovery Miles 44 910 Ships in 12 - 17 working days

Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel algorithms, solutions for addressing issues in applications, security, authentication, and privacy. The book provides an overview of the clinical scientific research enabling smart diagnosis equipment through AI. It presents the role these technologies play in augmented reality and blockchain, covers digital currency managed with bitcoin, and discusses deep learning and how it can enhance human thoughts and behaviors. Targeted audiences range from those interested in the technical revolution of blockchain, big data and the Internet of Things, to research scholars and the professional market.

Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,178 Discovery Miles 31 780 Ships in 12 - 17 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

An In-Depth Guide to Mobile Device Forensics (Hardcover): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Hardcover)
Chuck Easttom
R3,481 Discovery Miles 34 810 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Stuxnet to Sunburst - 20 Years of Digital Exploitation and Cyber Warfare (Hardcover): Andrew Jenkinson Stuxnet to Sunburst - 20 Years of Digital Exploitation and Cyber Warfare (Hardcover)
Andrew Jenkinson
R3,179 Discovery Miles 31 790 Ships in 12 - 17 working days

Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,548 Discovery Miles 15 480 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

The Right to be Forgotten - A Canadian and Comparative Perspective (Paperback): Ignacio Cofone The Right to be Forgotten - A Canadian and Comparative Perspective (Paperback)
Ignacio Cofone
R665 Discovery Miles 6 650 Ships in 12 - 17 working days

Exploring the evolution of the right to be forgotten, its challenges, and impacts on privacy, reputation, and online expression, this book lays out the current state of the law on the right to be forgotten in Canada and in the international context while addressing the broader theoretical tensions at the core of the right to be forgotten.

It's Your Digital Life (Paperback): Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan It's Your Digital Life (Paperback)
Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan
R1,433 Discovery Miles 14 330 Ships in 12 - 17 working days

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

It's Your Digital Life (Hardcover): Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan It's Your Digital Life (Hardcover)
Giri Govindarajulu, Shyam Sundar Ramaswami, Shriram K. Vasudevan
R3,187 Discovery Miles 31 870 Ships in 12 - 17 working days

This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life. This book aims to provide a complete and comprehensive analysis, technological inputs and case studies for the readers to build their awareness and knowledge, but in a meaningful way which will stay relevant. There are books available on the market, but they primarily discuss theory, and no industry connection or current state-of-the-art technology is presented. By discussing subjects and experiences that all readers will be familiar with, this book will aid understanding and comprehension of how cyber threats can be noticed, avoided and understood in everyday life. As well as case studies, this book also contains plentiful illustrations and supplementary videos, which will be available via YouTube to complement the information. Giri Govindarajulu is a Chief Information Security officer for Cisco Asiapac and is a 20-year Cisco veteran. Shyam Sundar Ramaswami is the Lead Threat Researcher with the Cisco Talos Threat Intelligence group. Shyam is a two-time TEDx speaker and a teacher of cybersecurity. Dr. Shriram K. Vasudevan is currently working as Dean of K. Ramakrishnan College of Technology. He has authored/co-authored 42 books for reputed publishers across the globe and 122 research papers in revered international journals, plus 30 papers for international/national conferences.

Blockchain for Big Data - AI, IoT and Cloud Perspectives (Hardcover): Shaoliang Peng Blockchain for Big Data - AI, IoT and Cloud Perspectives (Hardcover)
Shaoliang Peng
R1,948 Discovery Miles 19 480 Ships in 12 - 17 working days

In recent years, the fast-paced development of social information and networks has led to the explosive growth of data. A variety of big data have emerged, encouraging researchers to make business decisions by analysing this data. However, many challenges remain, especially concerning data security and privacy. Big data security and privacy threats permeate every link of the big data industry chain, such as data production, collection, processing, and sharing, and the causes of risk are complex and interwoven. Blockchain technology has been highly praised and recognised for its decentralised infrastructure, anonymity, security, and other characteristics, and it will change the way we access and share information. In this book, the author demonstrates how blockchain technology can overcome some limitations in big data technology and can promote the development of big data while also helping to overcome security and privacy challenges. The author investigates research into and the application of blockchain technology in the field of big data and assesses the attendant advantages and challenges while discussing the possible future directions of the convergence of blockchain and big data. After mastering concepts and technologies introduced in this work, readers will be able to understand the technical evolution, similarities, and differences between blockchain and big data technology, allowing them to further apply it in their development and research. Author: Shaoliang Peng is the Executive Director and Professor of the College of Computer Science and Electronic Engineering, National Supercomputing Centre of Hunan University, Changsha, China. His research interests are high-performance computing, bioinformatics, big data, AI, and blockchain.

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R3,917 Discovery Miles 39 170 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

The GDPR Challenge - Privacy, Technology, and Compliance in an Age of Accelerating Change (Hardcover): Amie Taal The GDPR Challenge - Privacy, Technology, and Compliance in an Age of Accelerating Change (Hardcover)
Amie Taal
R2,583 Discovery Miles 25 830 Ships in 12 - 17 working days

A must have book on how GDPR is actively working in the privacy, compliance and technology space. Gain a clear understanding of GDPR requirements and recognise opportunities to reshape your data privacy compliance programs. Learn unique techniques to avoid GDPR non-compliance in the third and fourth industrial revolution era. A practical guide to providing great insights on data privacy challenges and compliance with invaluable practical approaches. Demonstrates data privacy legislation differences and similarities in multi-jurisdictions and how to man oeuvre the minefield of privacy successfully.

Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover): Ari Ezra Waldman Industry Unbound - The Inside Story of Privacy, Data, and Corporate Power (Hardcover)
Ari Ezra Waldman
R623 Discovery Miles 6 230 Ships in 12 - 17 working days

In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also manipulate how we think about privacy, how their employees approach their work, and how they weaken the law to make data-extractive products the norm. In contrast to those who claim that privacy law is getting stronger, Waldman shows why recent shifts in privacy law are precisely the kinds of changes that corporations want and how even those who think of themselves as privacy advocates often unwittingly facilitate corporate malfeasance. This powerful account should be read by anyone who wants to understand why privacy laws are not working and how corporations trap us into giving up our personal information.

Cybersecurity Issues in Emerging Technologies (Hardcover): Leandros Maglaras, Ioanna Kantzavelou Cybersecurity Issues in Emerging Technologies (Hardcover)
Leandros Maglaras, Ioanna Kantzavelou
R2,385 Discovery Miles 23 850 Ships in 12 - 17 working days

The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.

Stuxnet to Sunburst - 20 Years of Digital Exploitation and Cyber Warfare (Paperback): Andrew Jenkinson Stuxnet to Sunburst - 20 Years of Digital Exploitation and Cyber Warfare (Paperback)
Andrew Jenkinson
R963 Discovery Miles 9 630 Ships in 12 - 17 working days

Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.

Cybersecurity - Ambient Technologies, IoT, and Industry 4.0 Implications (Hardcover): Gautam Kumar, Om Prakash Singh, Hemraj... Cybersecurity - Ambient Technologies, IoT, and Industry 4.0 Implications (Hardcover)
Gautam Kumar, Om Prakash Singh, Hemraj Saini
R4,054 Discovery Miles 40 540 Ships in 12 - 17 working days

It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more advanced topics. Along with exploring security and privacy issues through the IoT ecosystem and examining its implications to the real-world, this book addresses cryptographic tools and techniques and presents the basic and high-level concepts that can serve as guidance for those in the industry as well as help beginners get a handle on both the basic and advanced aspects of security related issues. The book goes on to cover major challenges, issues, and advances in IoT and discusses data processing as well as applications for solutions, and assists in developing self-adaptive cyberphysical security systems that will help with issues brought about by new technologies within IoT and Industry 4.0. This edited book discusses the evolution of IoT and Industry 4.0 and brings security and privacy related technological tools and techniques onto a single platform so that researchers, industry professionals, graduate, postgraduate students, and academicians can easily understand the security, privacy, challenges and opportunity concepts and make then ready to use for applications in IoT and Industry 4.0.

Securing Systems - Applied Security Architecture and Threat Models (Paperback): Brook S. E. Schoenfield Securing Systems - Applied Security Architecture and Threat Models (Paperback)
Brook S. E. Schoenfield
R1,499 Discovery Miles 14 990 Ships in 12 - 17 working days

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

Integration of WSNs into Internet of Things - A Security Perspective (Hardcover): Sudhir Kumar Sharma, Bharat Bhushan,... Integration of WSNs into Internet of Things - A Security Perspective (Hardcover)
Sudhir Kumar Sharma, Bharat Bhushan, Raghvendra Kumar, Aditya Khamparia, Narayan C Debnath
R3,903 Discovery Miles 39 030 Ships in 12 - 17 working days

The Internet has gone from an Internet of people to an Internet of Things (IoT). This has brought forth strong levels of complexity in handling interoperability that involves the integrating of wireless sensor networks (WSNs) into IoT. This book offers insights into the evolution, usage, challenges, and proposed countermeasures associated with the integration. Focusing on the integration of WSNs into IoT and shedding further light on the subtleties of such integration, this book aims to highlight the encountered problems and provide suitable solutions. It throws light on the various types of threats that can attack both WSNs and IoT along with the recent approaches to counter them. This book is designed to be the first choice of reference at research and development centers, academic institutions, university libraries, and any institution interested in the integration of WSNs into IoT. Undergraduate and postgraduate students, Ph.D. scholars, industry technologists, young entrepreneurs, and researchers working in the field of security and privacy in IoT are the primary audience of this book.

Data Science and Big Data Analytics in Smart Environments (Hardcover): Marta Chinnici, Florin Pop, Catalin Negru Data Science and Big Data Analytics in Smart Environments (Hardcover)
Marta Chinnici, Florin Pop, Catalin Negru
R4,514 Discovery Miles 45 140 Ships in 12 - 17 working days

Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services. Data grows rapidly, since applications produce continuously increasing volumes of both unstructured and structured data. Large-scale interconnected systems aim to aggregate and efficiently exploit the power of widely distributed resources. In this context, major solutions for scalability, mobility, reliability, fault tolerance and security are required to achieve high performance and to create a smart environment. The impact on data processing, transfer and storage is the need to re-evaluate the approaches and solutions to better answer the user needs. A variety of solutions for specific applications and platforms exist so a thorough and systematic analysis of existing solutions for data science, data analytics, methods and algorithms used in Big Data processing and storage environments is significant in designing and implementing a smart environment. Fundamental issues pertaining to smart environments (smart cities, ambient assisted leaving, smart houses, green houses, cyber physical systems, etc.) are reviewed. Most of the current efforts still do not adequately address the heterogeneity of different distributed systems, the interoperability between them, and the systems resilience. This book will primarily encompass practical approaches that promote research in all aspects of data processing, data analytics, data processing in different type of systems: Cluster Computing, Grid Computing, Peer-to-Peer, Cloud/Edge/Fog Computing, all involving elements of heterogeneity, having a large variety of tools and software to manage them. The main role of resource management techniques in this domain is to create the suitable frameworks for development of applications and deployment in smart environments, with respect to high performance. The book focuses on topics covering algorithms, architectures, management models, high performance computing techniques and large-scale distributed systems.

Convergence of Blockchain Technology and E-Business - Concepts, Applications, and Case Studies (Hardcover): D. Sumathi, T... Convergence of Blockchain Technology and E-Business - Concepts, Applications, and Case Studies (Hardcover)
D. Sumathi, T Poongodi, Balamurugan Balusamy, Bansal Himani, Firoz Khan Kp
R4,512 Discovery Miles 45 120 Ships in 12 - 17 working days

The purpose of this edited book is to provide the relevant technologies and case studies in a concise format that will simplify and streamline the processing of blockchain. The goal is for the contents of this book to change the way business transformations are conducting in economic and social systems. The book examines blockchain technology, the transaction attributes, and its footprint in various fields. It offers fundamentals and terminologies used in blockchain, architecture, and various consensus mechanisms that can be deployed in areas such as healthcare, smart cities, and supply chain management. The book provides a widespread knowledge into the deployment of security countermeasures that can be implemented for a blockchain network and enables the reader to consider the management of business processes and the implementation process in detail. The book highlights the challenges and provides various e-business case studies of security countermeasures. The book serves researchers and businesses by providing a thorough understanding of the transformation process using blockchain technology.

Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Hardcover): Shuang Geng, Kris M y Law,... Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing (Hardcover)
Shuang Geng, Kris M y Law, Andrew W. H. Ip, Brij B. Gupta
R2,581 Discovery Miles 25 810 Ships in 12 - 17 working days

Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is related to rising concerns about privacy and trusted communication issues that concern management and leaders of business organizations. Managing IoT and Mobile Technologies with Innovation, Trust, and Sustainable Computing not only targets IT experts and drills down on the technical issues but also provides readers from various groups with a well-linked concept about how the latest trends of mobile technologies are closely related to daily living and the workplace at managerial and even individual levels.

The Home in the Digital Age (Hardcover): Antonio Argandona, Joy Malala, Richard Peatfield The Home in the Digital Age (Hardcover)
Antonio Argandona, Joy Malala, Richard Peatfield
R4,062 Discovery Miles 40 620 Ships in 12 - 17 working days

The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes. The book covers a wide variety of topics on the design, introduction and use of digital technologies in the home, combining the technological dimension with the cognitive, emotional, cultural and symbolic dimensions of the objects that incorporate digital technologies and project them onto people's lives. It offers a coherent approach, that of the home, which gives unity to the discussion. Scholars of the home, the house and the family will find here the connection with the problems derived from the use of domestic robots and connected devices. Students of artificial intelligence, machine learning, robotics, big data and other branches of digital technologies will find ideas and arguments to apply their disciplines to the home and participate fruitfully in forums where digital technologies are built and negotiated in the home. Experts from various disciplines psychologists and sociologists; philosophers, epistemologists and ethicists; economists; engineers, architects, urban planners and designers and so on and also those interested in developing policies for the home and family will find this book contains well-founded and useful ideas to focus their work.

Cloud Security - Concepts, Applications and Perspectives (Hardcover): Brij B. Gupta Cloud Security - Concepts, Applications and Perspectives (Hardcover)
Brij B. Gupta
R5,246 Discovery Miles 52 460 Ships in 12 - 17 working days

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of cloud also raises concerns such as security, privacy, latency, and governance, that keep it from turning into the predominant option for critical frameworks. As such, there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts, Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies, and provides a wide range of examples and illustrations to effectively show the concepts, applications, and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition, it covers future research directions in the domain. This book is suitable for professionals in the field, researchers, students who are want to carry out research in the field of computer and cloud security, faculty members across universities, and software developers engaged in software development in the field.

Cybersecurity in the COVID-19 Pandemic (Hardcover): Kenneth Okereafor Cybersecurity in the COVID-19 Pandemic (Hardcover)
Kenneth Okereafor
R1,523 Discovery Miles 15 230 Ships in 12 - 17 working days

As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book's primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.

Secure Searchable Encryption and Data Management (Hardcover): Mamta, Brij B. Gupta Secure Searchable Encryption and Data Management (Hardcover)
Mamta, Brij B. Gupta
R1,521 Discovery Miles 15 210 Ships in 12 - 17 working days

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it's a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.

Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover): Brij B.... Distributed Denial of Service (DDoS) Attacks - Classification, Attacks, Challenges and Countermeasures (Hardcover)
Brij B. Gupta, Amrita Dahiya
R1,530 Discovery Miles 15 300 Ships in 12 - 17 working days

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker's motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks - Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,222 Discovery Miles 22 220
Social Engineering - The Science of…
C Hadnagy Paperback R830 R660 Discovery Miles 6 600
Cybersecurity For Dummies, 2nd Edition
J. Steinberg Paperback R779 R560 Discovery Miles 5 600
Botnets - Architectures…
Georgios Kambourakis, Marios Anagnostopoulos, … Paperback R1,411 Discovery Miles 14 110
The Little Black Book of Data and…
Kyle Taylor Paperback R271 Discovery Miles 2 710
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,855 Discovery Miles 28 550
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,995 Discovery Miles 29 950
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280

 

Partners