0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016): Ehab Al-Shaer,... Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016)
Ehab Al-Shaer, Mohammad Ashiqur Rahman
R3,221 Discovery Miles 32 210 Ships in 12 - 17 working days

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.

Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.): Ehab Al-Shaer Automated Firewall Analytics - Design, Configuration and Optimization (Hardcover, 2014 ed.)
Ehab Al-Shaer
R3,208 Discovery Miles 32 080 Ships in 12 - 17 working days

This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author also reveals a high-level service-oriented firewall configuration language (called FLIP) and a methodology and framework for designing optimal distributed firewall architecture. The chapters illustrate the concepts, algorithms, implementations and case studies for each technique. Automated Firewall Analytics: Design, Configuration and Optimization is appropriate for researchers and professionals working with firewalls. Advanced-level students in computer science will find this material suitable as a secondary textbook or reference.

Automated Security Management (Hardcover, 2013 ed.): Ehab Al-Shaer, Xinming Ou, Geoffrey Xie Automated Security Management (Hardcover, 2013 ed.)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,997 R1,821 Discovery Miles 18 210 Save R1,176 (39%) Ships in 12 - 17 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Paperback, Softcover reprint of the original... Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Paperback, Softcover reprint of the original 1st ed. 2016)
Ehab Al-Shaer, Mohammad Ashiqur Rahman
R3,196 Discovery Miles 31 960 Ships in 10 - 15 working days

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.

Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013): Ehab Al-Shaer, Xinming Ou, Geoffrey... Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R1,980 Discovery Miles 19 800 Ships in 10 - 15 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Autonomic Networking - First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006, Proceedings... Autonomic Networking - First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006, Proceedings (Paperback, 2006 ed.)
Dominique Gaiti, Guy Pujolle, Ehab Al-Shaer, Ken Calvert, Simon Dobson, …
R1,582 Discovery Miles 15 820 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International IFIP TC6 Conference on Autonomic Networking, AN 2006. The 24 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on autonomic networks, self-configuration, autonomic platform and services, autonomic management and discovery policy-based management, ad hoc, sensor and ambient autonomic networks, and autonomic control of mobile networks.

Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings (Hardcover, 1st ed. 2019): Ehab... Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings (Hardcover, 1st ed. 2019)
Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang
R1,732 R1,623 Discovery Miles 16 230 Save R109 (6%) Ships in 9 - 15 working days

This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. An important distinguishing characteristic of this book is its inclusion of student exercises at the end of each chapter. Exercises include technical problems, short-answer discussion questions, or hands-on lab exercises, organized at a range of difficulties from easy to advanced,. This is a useful textbook for a wide range of classes and degree levels within the security arena and other related topics. It's also suitable for researchers and practitioners with a variety of cyber security backgrounds from novice to experienced.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
An Evening With Silk Sonic
Bruno Mars, Anderson .Paak, … CD  (2)
R286 Discovery Miles 2 860
Konix Naruto Gamepad for Nintendo Switch…
R699 R599 Discovery Miles 5 990
Everlotus CD DVD wallet, 72 discs
 (1)
R129 R99 Discovery Miles 990
The Papery A5 MOM 2025 Diary - Dragonfly
R349 R300 Discovery Miles 3 000
Professor Snape Wizard Wand - In…
 (8)
R801 Discovery Miles 8 010
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn Paperback  (5)
R199 R145 Discovery Miles 1 450
Raz Tech Laptop Security Chain Cable…
R299 R169 Discovery Miles 1 690
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Efekto Roundup - Ready-To-Use Weedkiller…
R369 R299 Discovery Miles 2 990
Midnights
Taylor Swift CD R394 Discovery Miles 3 940

 

Partners