0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Social Network Analytics for Contemporary Business Organizations (Hardcover): Himani Bansal, Gulshan Shrivastava, Gia Nhu... Social Network Analytics for Contemporary Business Organizations (Hardcover)
Himani Bansal, Gulshan Shrivastava, Gia Nhu Nguyen, Loredana-Mihaela Stanciu
R5,363 Discovery Miles 53 630 Ships in 18 - 22 working days

Social technology is quickly becoming a vital tool in our personal, educational, and professional lives. Its use must be further examined in order to determine the role of social media technology in organizational settings to promote business development and growth. Social Network Analytics for Contemporary Business Organizations is a critical scholarly resource that analyzes the application of social media in business applications. Featuring coverage on a broad range of topics, such as business management, dynamic networks, and online interaction, this book is geared towards professionals, researchers, academics, students, managers, and practitioners actively involved in the business industry.

Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R5,331 Discovery Miles 53 310 Ships in 18 - 22 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover): Gulshan Shrivastava, Deepak... Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover)
Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
R4,522 Discovery Miles 45 220 Ships in 10 - 15 working days

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.

New Age Analytics - Transforming the Internet through Machine Learning, IoT, and Trust Modeling (Paperback): Gulshan... New Age Analytics - Transforming the Internet through Machine Learning, IoT, and Trust Modeling (Paperback)
Gulshan Shrivastava, Sheng-Lung Peng, Himani Bansal, Kavita Sharma, Meenakshi Sharma
R2,467 Discovery Miles 24 670 Ships in 10 - 15 working days

This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more. This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.

New Age Analytics - Transforming the Internet through Machine Learning, IoT, and Trust Modeling (Hardcover): Gulshan... New Age Analytics - Transforming the Internet through Machine Learning, IoT, and Trust Modeling (Hardcover)
Gulshan Shrivastava, Sheng-Lung Peng, Himani Bansal, Kavita Sharma, Meenakshi Sharma
R3,839 Discovery Miles 38 390 Ships in 10 - 15 working days

This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more. This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.

Forensic Investigations and Risk Management in Mobile and Wireless Communications (Paperback): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Paperback)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R4,144 Discovery Miles 41 440 Ships in 18 - 22 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private ""e-Discovery"" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
If I Survive You
Jonathan Escoffery Paperback R301 R276 Discovery Miles 2 760
Get Your Will Right - A Guide For…
Chris Sloane, Wendy Mangin Paperback R180 R161 Discovery Miles 1 610
The Emergence of Life - From Chemical…
Pier Luigi Luisi Hardcover R2,094 Discovery Miles 20 940
House Of Earth And Blood - Crescent…
Sarah Maas Paperback  (2)
R497 R455 Discovery Miles 4 550
Attention Seniors!!
Harvey Dunn Hardcover R832 R731 Discovery Miles 7 310
NIV Holy Bible Compact Burgundy Comfort…
Zondervan Paperback R240 R221 Discovery Miles 2 210
GBC 6mm CombBind 21 Loop Binders (100…
R132 Discovery Miles 1 320
Small Changes For Big Results - How To…
Warren Ingram, Marc Rogatschnig Paperback R330 R305 Discovery Miles 3 050
Rexel Momentum X410 Cross-Cut P4…
R4,538 R4,247 Discovery Miles 42 470
The Truth about Retirement Plans and…
Ric Edelman Paperback R404 R382 Discovery Miles 3 820

 

Partners