0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Cyber Security and Critical Infrastructures (Hardcover): Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag Cyber Security and Critical Infrastructures (Hardcover)
Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag
R2,115 R1,805 Discovery Miles 18 050 Save R310 (15%) Ships in 18 - 22 working days
Hybrid Threats, Cyberterrorism and Cyberwarfare: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
R3,074 Discovery Miles 30 740 Ships in 10 - 15 working days

Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.

Hybrid Threats, Cyberterrorism and Cyberwarfare: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
R1,465 Discovery Miles 14 650 Ships in 10 - 15 working days

Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.

Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022,... Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers (1st ed. 2023)
Giampaolo Bella, Mihai Doinea, Helge Janicke
R2,102 Discovery Miles 21 020 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 -... Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Proceedings (Paperback, 1st ed. 2017)
Leandros A. Maglaras, Helge Janicke, Kevin Jones
R1,970 Discovery Miles 19 700 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial Networks and Intelligent Systems, INISCOM 2016 held in Leicester, UK, October 31 - November 1, 2016. The 15 revised full papers carefully reviewed and selected from 22 submissions. The papers cover topics on industrial networks and applications, intelligent systems, information processing and data analysis, hardware and software design and development, security and privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Telefunken TWH-2000 DBld Wireless TV…
 (3)
R308 Discovery Miles 3 080
Polaroid Bluetooth 35hr Headphones…
R399 R350 Discovery Miles 3 500
Kitchen Inspire Muffin (10 Piece…
R108 Discovery Miles 1 080
Automatic PG200 Blowtorch
R375 Discovery Miles 3 750
Zyliss Rolling Pin
R749 R630 Discovery Miles 6 300
Kitchen Inspire 2 Way Scraper
R126 Discovery Miles 1 260
Brewing Tolerance - A MooseLamb…
Elinda Deans, Sam Deans Hardcover R663 R592 Discovery Miles 5 920
Kamala Harris, Volume 67
Maria Isabel Sanchez Vegara Hardcover R249 R225 Discovery Miles 2 250
CANYON headset OnRiff 6 ANC Blue
R599 Discovery Miles 5 990
Skullcandy Crusher Evo Wireless Over-Ear…
R3,225 Discovery Miles 32 250

 

Partners