0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Cyber Security and Critical Infrastructures (Hardcover): Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag Cyber Security and Critical Infrastructures (Hardcover)
Leandros Maglaras, Helge Janicke, Mohamed Amine Ferrag
R1,857 Discovery Miles 18 570 Ships in 12 - 17 working days
Hybrid Threats, Cyberterrorism and Cyberwarfare: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
R3,253 Discovery Miles 32 530 Ships in 12 - 17 working days

Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.

Hybrid Threats, Cyberterrorism and Cyberwarfare: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
R1,471 Discovery Miles 14 710 Ships in 12 - 17 working days

Nowadays, in Cyberspace there is a burst of information that everyone has access. However, apart from the advantages the Internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term, encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict etc and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyber-conflict’ and ‘cyber-war’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyber-war basically refers to a sustained computer-based cyber-attack by a state against the IT infrastructure of a target state. On the other hand cyber-security is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. The book discusses and analyses current posture of cyberterrorism, cyberwarfare, and hybrid threats, sector specific cyber-attacks that have the form of cyberterrorism and presents the recent actions that EU, USA and other Nations have taken in order to strengthen their systems against such attacks. There has never been a higher risk of a major catastrophe as a result of the rise in offensive cyber activity, particularly the possibility of cyber-physical strikes against critical services. Recent cyber-attacks against critical infrastructures along with the continuous migration crisis have been the main driving forces that led to the decision to publish this book.

Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022,... Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers (1st ed. 2023)
Giampaolo Bella, Mihai Doinea, Helge Janicke
R2,205 Discovery Miles 22 050 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 -... Industrial Networks and Intelligent Systems - Second International Conference, INISCOM 2016, Leicester, UK, October 31 - November 1, 2016, Proceedings (Paperback, 1st ed. 2017)
Leandros A. Maglaras, Helge Janicke, Kevin Jones
R2,077 Discovery Miles 20 770 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial Networks and Intelligent Systems, INISCOM 2016 held in Leicester, UK, October 31 - November 1, 2016. The 15 revised full papers carefully reviewed and selected from 22 submissions. The papers cover topics on industrial networks and applications, intelligent systems, information processing and data analysis, hardware and software design and development, security and privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Capitec - Stalking Giants
T J Strydom Paperback R320 R245 Discovery Miles 2 450
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Harry Potter Wizard Wand - In…
 (3)
R800 Discovery Miles 8 000
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R249 Discovery Miles 2 490
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R263 Discovery Miles 2 630
Wonder Plant Food Stix - Premium Plant…
R49 R41 Discovery Miles 410
Efekto Cypermethrin - Emulsifiable…
R109 Discovery Miles 1 090
Air Fryer - Herman's Top 100 Recipes
Herman Lensing Paperback R350 R245 Discovery Miles 2 450
Cricut Joy Machine
 (6)
R3,595 Discovery Miles 35 950
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840

 

Partners