0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Cyber Security and Critical Infrastructures (Hardcover): Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag Cyber Security and Critical Infrastructures (Hardcover)
Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag
R1,857 Discovery Miles 18 570 Ships in 12 - 17 working days
Hybrid Threats, Cyberterrorism and Cyberwarfare: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
R3,253 Discovery Miles 32 530 Ships in 12 - 17 working days

Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.

Hybrid Threats, Cyberterrorism and Cyberwarfare: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
R1,471 Discovery Miles 14 710 Ships in 12 - 17 working days

Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.

Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022,... Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers (1st ed. 2023)
Giampaolo Bella, Mihai Doinea, Helge Janicke
R2,205 Discovery Miles 22 050 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 -... Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Proceedings (Paperback, 1st ed. 2017)
Leandros A. Maglaras, Helge Janicke, Kevin Jones
R2,077 Discovery Miles 20 770 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial Networks and Intelligent Systems, INISCOM 2016 held in Leicester, UK, October 31 - November 1, 2016. The 15 revised full papers carefully reviewed and selected from 22 submissions. The papers cover topics on industrial networks and applications, intelligent systems, information processing and data analysis, hardware and software design and development, security and privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Brother JA1400 Basic Multi Purpose…
 (3)
R3,299 R2,299 Discovery Miles 22 990
Philips TAUE101 Wired In-Ear Headphones…
R199 R129 Discovery Miles 1 290
Bantex @School Acrylic Paint - Yellow…
R21 Discovery Miles 210
Wagworld Leafy Mat - Fleece…
 (1)
R549 R367 Discovery Miles 3 670
Croxley Desk Cube Holder (Black) - Paper…
 (1)
R39 R29 Discovery Miles 290
The Walking Dead - Season 1 / 2 / 3 / 4
Andrew Lincoln Blu-ray disc  (1)
R277 Discovery Miles 2 770
Peptine Pro Equine Hydrolysed Collagen…
 (2)
R359 R249 Discovery Miles 2 490
Mellerware Aquillo Desktop Fan (White…
R579 Discovery Miles 5 790
Seven Worlds, One Planet
David Attenborough DVD R64 Discovery Miles 640
Baby Dove Lotion Night Time
R80 Discovery Miles 800

 

Partners