0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (6)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

New Dimensions of Information Warfare (Paperback, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Paperback, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,731 Discovery Miles 47 310 Ships in 10 - 15 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

New Dimensions of Information Warfare (Hardcover, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Hardcover, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,764 Discovery Miles 47 640 Ships in 10 - 15 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International... Data Privacy Management and Autonomous Spontaneous Security - 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State
R1,574 Discovery Miles 15 740 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management.

Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September... Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Angelos D. Keromytis, Roberto Di Pietro
R1,659 R1,013 Discovery Miles 10 130 Save R646 (39%) Ships in 9 - 15 working days

This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The 21 revised papers included in the volume were carefully reviewed and selected from 73 submissions. Topics covered include crypto and electronic money; wireless security; web security; intrusion detection and monitoring; and anonymity and privacy.

Intrusion Detection Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008): Roberto Di Pietro, Luigi V. Mancini Intrusion Detection Systems (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Roberto Di Pietro, Luigi V. Mancini
R4,485 Discovery Miles 44 850 Ships in 10 - 15 working days

To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.

Intrusion Detection Systems (Hardcover, 2008 ed.): Roberto Di Pietro, Luigi V. Mancini Intrusion Detection Systems (Hardcover, 2008 ed.)
Roberto Di Pietro, Luigi V. Mancini
R4,510 Discovery Miles 45 100 Ships in 10 - 15 working days

In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems (IDSs). Intrusion Detection Systems is an edited volume by world class leaders in this field. This edited volume sheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more. This volume is presented in an easy-to-follow style while including a rigorous treatment of the issues, solutions, and technologies tied to the field. Intrusion Detection Systems is designed for a professional audience composed of researchers and practitioners within the computer network and information security industry. It is also suitable as a reference or secondary textbook for advanced-level students in computer science.

Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September... Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
R1,721 Discovery Miles 17 210 Ships in 10 - 15 working days

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September... Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
R2,851 Discovery Miles 28 510 Ships in 10 - 15 working days

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September... Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode.The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, …
R1,661 Discovery Miles 16 610 Ships in 10 - 15 working days

This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020. The 48 papers were carefully reviewed and selected from 131 submissions and cover a broad range of topics on security, privacy and anonymity in computation communication, and storage, including the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the Second International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).

Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings (Paperback, 1st ed. 2021)
Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, …
R1,603 Discovery Miles 16 030 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, held in Nanjing, China, in December 2020. The 30 full papers were carefully reviewed and selected from 88 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. SpaCCS 2020 is held jointly with the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).

Role Mining In Business: Taming Role-based Access Control Administration (Hardcover): Roberto Di Pietro, Alessandro Colantonio,... Role Mining In Business: Taming Role-based Access Control Administration (Hardcover)
Roberto Di Pietro, Alessandro Colantonio, Alberto Ocello
R2,875 Discovery Miles 28 750 Ships in 10 - 15 working days

With continuous growth in the number of information objects and the users that can access these objects, ensuring that access is compliant with company policies has become a big challenge. Role-based Access Control (RBAC) - a policy-neutral access control model that serves as a bridge between academia and industry - is probably the most suitable security model for commercial applications.Interestingly, role design determines RBAC's cost. When there are hundreds or thousands of users within an organization, with individual functions and responsibilities to be accurately reflected in terms of access permissions, only a well-defined role engineering process allows for significant savings of time and money while protecting data and systems.Among role engineering approaches, searching through access control systems to find de facto roles embedded in existing permissions is attracting increasing interest. The focus falls on role mining, which is applied data mining techniques to automate - to the extent possible - the role design task.This book explores existing role mining algorithms and offers insights into the automated role design approaches proposed in the literature. Alongside theory, this book acts as a practical guide for using role mining tools when implementing RBAC. Besides a comprehensive survey of role mining techniques deeply rooted in academic research, this book also provides a summary of the role-based approach, access control concepts and describes a typical role engineering process.Among the pioneering works on role mining, this book blends business elements with data mining theory, and thus further extends the applications of role mining into business practice. This makes it a useful guide for all academics, IT and business professionals.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ugreen USB-A to Micro-USB Cable…
R71 Discovery Miles 710
Too Hard To Forget
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Wild About You - A 60-Day Devotional For…
John Eldredge, Stasi Eldredge Hardcover R299 R246 Discovery Miles 2 460
Nite Ize Keyrack Steel S-Biner…
R118 Discovery Miles 1 180
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Benylin Mucus Relief Wet Cough Syrup…
R40 Discovery Miles 400
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Bug-A-Salt 3.0 Black Fly
 (1)
R999 Discovery Miles 9 990

 

Partners