0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Cyber Security and Critical Infrastructures (Hardcover): Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag Cyber Security and Critical Infrastructures (Hardcover)
Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag
R2,297 R1,953 Discovery Miles 19 530 Save R344 (15%) Ships in 10 - 15 working days
Hybrid Threats, Cyberterrorism and Cyberwarfare: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
R3,265 Discovery Miles 32 650 Ships in 12 - 19 working days

Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.

Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022,... Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers (1st ed. 2023)
Giampaolo Bella, Mihai Doinea, Helge Janicke
R2,276 Discovery Miles 22 760 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

Hybrid Threats, Cyberterrorism and Cyberwarfare: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
R1,554 Discovery Miles 15 540 Ships in 12 - 19 working days

Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.

Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 -... Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Proceedings (Paperback, 1st ed. 2017)
Leandros A. Maglaras, Helge Janicke, Kevin Jones
R2,132 Discovery Miles 21 320 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial Networks and Intelligent Systems, INISCOM 2016 held in Leicester, UK, October 31 - November 1, 2016. The 15 revised full papers carefully reviewed and selected from 22 submissions. The papers cover topics on industrial networks and applications, intelligent systems, information processing and data analysis, hardware and software design and development, security and privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Essay Concerning Human Understanding…
John Locke Paperback R679 Discovery Miles 6 790
12 Rules For Life - An Antidote To Chaos
Jordan B. Peterson Paperback  (2)
R295 R272 Discovery Miles 2 720
Filial Piety in Chinese Buddhism
Guang Xing Hardcover R2,444 Discovery Miles 24 440
Interrelatedness in Chinese Religious…
Diana Arghirescu Hardcover R3,032 Discovery Miles 30 320
Confucianism in China - An Introduction
Tony Swain Hardcover R3,223 Discovery Miles 32 230
Persons Emerging - Three Neo-Confucian…
Galia Patt-Shamir Hardcover R1,967 Discovery Miles 19 670
Glengarry Glen Ross
David Mamet Hardcover R1,306 Discovery Miles 13 060
MOTHER CHRISTMAS
David Lewis Paperback R330 Discovery Miles 3 300
An Essay Concerning Human Understanding
John Locke Paperback R751 Discovery Miles 7 510
Voices
Dr Bill Thompson Paperback R238 Discovery Miles 2 380

 

Partners