0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (10)
  • R2,500 - R5,000 (23)
  • R5,000 - R10,000 (7)
  • -
Status
Brand

Showing 1 - 25 of 40 matches in All Departments

Data Science in Cybersecurity and Cyberthreat Intelligence (Hardcover, 1st ed. 2020): Leslie F Sikos, Kim-Kwang Raymond Choo Data Science in Cybersecurity and Cyberthreat Intelligence (Hardcover, 1st ed. 2020)
Leslie F Sikos, Kim-Kwang Raymond Choo
R4,948 Discovery Miles 49 480 Ships in 10 - 15 working days

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.

Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
R4,704 Discovery Miles 47 040 Ships in 12 - 17 working days

This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.

Handbook of Big Data Privacy (Hardcover, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha Handbook of Big Data Privacy (Hardcover, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha
R5,011 Discovery Miles 50 110 Ships in 10 - 15 working days

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Digital Forensic Education - An Experiential Learning Approach (Hardcover, 1st ed. 2020): Xiaolu Zhang, Kim-Kwang Raymond Choo Digital Forensic Education - An Experiential Learning Approach (Hardcover, 1st ed. 2020)
Xiaolu Zhang, Kim-Kwang Raymond Choo
R2,827 Discovery Miles 28 270 Ships in 10 - 15 working days

In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also presented in the book. Digital forensics is a topic of increasing importance as our society becomes "smarter" with more of the "things" around us been internet- and inter-connected (e.g., Internet of Things (IoT) and smart home devices); thus, the increasing likelihood that we will need to acquire data from these things in a forensically sound manner. This book is of interest to both digital forensic educators and digital forensic practitioners, as well as students seeking to learn about digital forensics.

Cyber and Digital Forensic Investigations - A Law Enforcement Practitioner's Perspective (Hardcover, 1st ed. 2020):... Cyber and Digital Forensic Investigations - A Law Enforcement Practitioner's Perspective (Hardcover, 1st ed. 2020)
Nhien-An Le-Khac, Kim-Kwang Raymond Choo
R4,376 Discovery Miles 43 760 Ships in 12 - 17 working days

Understanding the latest capabilities in the cyber threat landscape as well as the cyber forensic challenges and approaches is the best way users and organizations can prepare for potential negative events. Adopting an experiential learning approach, this book describes how cyber forensics researchers, educators and practitioners can keep pace with technological advances, and acquire the essential knowledge and skills, ranging from IoT forensics, malware analysis, and CCTV and cloud forensics to network forensics and financial investigations. Given the growing importance of incident response and cyber forensics in our digitalized society, this book will be of interest and relevance to researchers, educators and practitioners in the field, as well as students wanting to learn about cyber forensics.

Secure Key Establishment (Hardcover, 1st Edition.
2nd Printing. 2008): Kim-Kwang Raymond Choo Secure Key Establishment (Hardcover, 1st Edition. 2nd Printing. 2008)
Kim-Kwang Raymond Choo
R2,802 Discovery Miles 28 020 Ships in 10 - 15 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2018 (Hardcover, 1st ed. 2019): James J. Park, Vincenzo Loia,... Advanced Multimedia and Ubiquitous Engineering - MUE/FutureTech 2018 (Hardcover, 1st ed. 2019)
James J. Park, Vincenzo Loia, Kim-Kwang Raymond Choo, Gangman Yi
R5,638 Discovery Miles 56 380 Ships in 10 - 15 working days

This book presents the combined proceedings of the 12th International Conference on Multimedia and Ubiquitous Engineering (MUE 2018) and the 13th International Conference on Future Information Technology (Future Tech 2018), both held in Salerno, Italy, April 23 - 25, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

Internet of Things Security and Privacy - Practical and Management Perspectives: Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond... Internet of Things Security and Privacy - Practical and Management Perspectives
Ali Ismail Awad, Atif Ahmad, Kim-Kwang Raymond Choo, Saqib Haqaq
R4,546 Discovery Miles 45 460 Ships in 12 - 17 working days

The Internet of Things (IoT) has emerged due to information and communication technology developments, expanding the ability to connect numerous objects. The wide range of facilities enabled by IoT has generated a vast amount of data, making cybersecurity an imperative requirement for personal safety and for ensuring the sustainability of IoT itself. This book covers security and privacy research in the IoT domain, compiling technical and management approaches, addressing real-world problems, and providing practical advice to the industry. The book includes a collection of high-quality research works covering key emerging trends in IoT security and privacy that span the entire IoT architecture layers, focusing on different critical IoT applications such as advanced metering infrastructure and smart grids, smart locks, and cyber-physical systems. The provided state-of-the-art body of knowledge is essential for researchers, practitioners, postgraduate students, and developers interested in the security and privacy of the IoT paradigm, IoT-based systems, and any related research discipline. The book is a valuable companion and comprehensive reference for postgraduate and possibly some senior undergraduate students taking an advanced IoT security and privacy course.

Handbook of Big Data Analytics and Forensics (Hardcover, 1st ed. 2022): Kim-Kwang Raymond Choo, Ali Dehghantanha Handbook of Big Data Analytics and Forensics (Hardcover, 1st ed. 2022)
Kim-Kwang Raymond Choo, Ali Dehghantanha
R4,979 Discovery Miles 49 790 Ships in 10 - 15 working days

This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.

Blockchains for Network Security - Principles, technologies and applications (Hardcover): Haojun Huang, Lizhe Wang, Yulei Wu,... Blockchains for Network Security - Principles, technologies and applications (Hardcover)
Haojun Huang, Lizhe Wang, Yulei Wu, Kim-Kwang Raymond Choo
R3,491 R3,056 Discovery Miles 30 560 Save R435 (12%) Ships in 10 - 15 working days

Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms. Over the past few years, blockchain technology has been used in a variety of network interaction systems such as smart contracts, public services, Internet of Things (IoT), social networks, reputation systems and security and financial services. With its widespread adoption, there has been increased focus on utilizing blockchain technologies to address network security concerns and vulnerabilities as well as understanding real-world security implications. The book begins with an introduction to blockchains, covering key principles and applications. Further chapters cover blockchain system architecture, applications and research issues; blockchain consensuses and incentives; blockchain applications, projects and implementations; blockchain for internet of things; blockchain in 5G and 6G networks; edgechain to provide security in organization based multi agent systems; blockchain driven privacy-preserving machine learning; performance evaluation of differential privacy mechanisms in blockchain based smart metering; scaling-out blockchains with sharding; blockchain for GIS; and finally blockchain applications in remote sensing big data management and production.

Handbook of Big Data and IoT Security (Hardcover, 1st ed. 2019): Ali Dehghantanha, Kim-Kwang Raymond Choo Handbook of Big Data and IoT Security (Hardcover, 1st ed. 2019)
Ali Dehghantanha, Kim-Kwang Raymond Choo
R5,008 Discovery Miles 50 080 Ships in 10 - 15 working days

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.

Security and Privacy for Big Data, Cloud Computing and Applications (Hardcover): Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo,... Security and Privacy for Big Data, Cloud Computing and Applications (Hardcover)
Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa
R3,624 R3,173 Discovery Miles 31 730 Save R451 (12%) Ships in 10 - 15 working days

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.

International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI'2020) - Emerging Applications... International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI'2020) - Emerging Applications and Technologies for Industry 4.0 (Paperback, 1st ed. 2021)
Jemal H. Abawajy, Kim-Kwang Raymond Choo, Haruna Chiroma
R3,565 Discovery Miles 35 650 Ships in 12 - 17 working days

This book addresses the adoption of intelligent algorithms for resolving challenges in different aspects of the society such as sport, cyber-security, COVID-19 pandemic, advertising, driving, smart environment-sensors, blockchain, cloud computing, and health. In addition, the book also covers machine learning fundamentals such as feature selection. The book presents practical simulation results and different illustrations in different chapters for easy understanding of concepts and approaches. The types of contributions in the book are as follows: original research, survey, and theoretical insight that describe advancement in the adoption of technique for resolving the broad range of challenges. Researchers, undergraduates, postgraduates, and industry experts will find the book as a valuable resource that bridges theory and practice.

Cyber and Digital Forensic Investigations - A Law Enforcement Practitioner's Perspective (Paperback, 1st ed. 2020):... Cyber and Digital Forensic Investigations - A Law Enforcement Practitioner's Perspective (Paperback, 1st ed. 2020)
Nhien-An Le-Khac, Kim-Kwang Raymond Choo
R4,468 Discovery Miles 44 680 Ships in 10 - 15 working days

Understanding the latest capabilities in the cyber threat landscape as well as the cyber forensic challenges and approaches is the best way users and organizations can prepare for potential negative events. Adopting an experiential learning approach, this book describes how cyber forensics researchers, educators and practitioners can keep pace with technological advances, and acquire the essential knowledge and skills, ranging from IoT forensics, malware analysis, and CCTV and cloud forensics to network forensics and financial investigations. Given the growing importance of incident response and cyber forensics in our digitalized society, this book will be of interest and relevance to researchers, educators and practitioners in the field, as well as students wanting to learn about cyber forensics.

Blockchain Cybersecurity, Trust and Privacy (Paperback, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi Blockchain Cybersecurity, Trust and Privacy (Paperback, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
R4,948 Discovery Miles 49 480 Ships in 10 - 15 working days

This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.

Handbook of Big Data Privacy (Paperback, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha Handbook of Big Data Privacy (Paperback, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha
R4,981 Discovery Miles 49 810 Ships in 10 - 15 working days

This handbook provides comprehensive knowledge and includes an overview of the current state-of-the-art of Big Data Privacy, with chapters written by international world leaders from academia and industry working in this field. The first part of this book offers a review of security challenges in critical infrastructure and offers methods that utilize acritical intelligence (AI) techniques to overcome those issues. It then focuses on big data security and privacy issues in relation to developments in the Industry 4.0. Internet of Things (IoT) devices are becoming a major source of security and privacy concern in big data platforms. Multiple solutions that leverage machine learning for addressing security and privacy issues in IoT environments are also discussed this handbook. The second part of this handbook is focused on privacy and security issues in different layers of big data systems. It discusses about methods for evaluating security and privacy of big data systems on network, application and physical layers. This handbook elaborates on existing methods to use data analytic and AI techniques at different layers of big data platforms to identify privacy and security attacks. The final part of this handbook is focused on analyzing cyber threats applicable to the big data environments. It offers an in-depth review of attacks applicable to big data platforms in smart grids, smart farming, FinTech, and health sectors. Multiple solutions are presented to detect, prevent and analyze cyber-attacks and assess the impact of malicious payloads to those environments. This handbook provides information for security and privacy experts in most areas of big data including; FinTech, Industry 4.0, Internet of Things, Smart Grids, Smart Farming and more. Experts working in big data, privacy, security, forensics, malware analysis, machine learning and data analysts will find this handbook useful as a reference. Researchers and advanced-level computer science students focused on computer systems, Internet of Things, Smart Grid, Smart Farming, Industry 4.0 and network analysts will also find this handbook useful as a reference.

Data Science in Cybersecurity and Cyberthreat Intelligence (Paperback, 1st ed. 2020): Leslie F Sikos, Kim-Kwang Raymond Choo Data Science in Cybersecurity and Cyberthreat Intelligence (Paperback, 1st ed. 2020)
Leslie F Sikos, Kim-Kwang Raymond Choo
R4,948 Discovery Miles 49 480 Ships in 10 - 15 working days

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.

2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber... 2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence (ATCI 2020) (Paperback, 1st ed. 2021)
Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman
R7,600 Discovery Miles 76 000 Ships in 10 - 15 working days

This book presents innovative ideas, cutting-edge findings, and novel techniques, methods, and applications in a broad range of cybersecurity and cyberthreat intelligence areas. As our society becomes smarter, there is a corresponding need to secure our cyberfuture. The book describes approaches and findings that are of interest to business professionals and governments seeking to secure our data and underpin infrastructures, as well as to individual users.

Digital Forensic Education - An Experiential Learning Approach (Paperback, 1st ed. 2020): Xiaolu Zhang, Kim-Kwang Raymond Choo Digital Forensic Education - An Experiential Learning Approach (Paperback, 1st ed. 2020)
Xiaolu Zhang, Kim-Kwang Raymond Choo
R2,796 Discovery Miles 27 960 Ships in 10 - 15 working days

In this book, the editors explain how students enrolled in two digital forensic courses at their institution are exposed to experiential learning opportunities, where the students acquire the knowledge and skills of the subject-matter while also learning how to adapt to the ever-changing digital forensic landscape. Their findings (e.g., forensic examination of different IoT devices) are also presented in the book. Digital forensics is a topic of increasing importance as our society becomes "smarter" with more of the "things" around us been internet- and inter-connected (e.g., Internet of Things (IoT) and smart home devices); thus, the increasing likelihood that we will need to acquire data from these things in a forensically sound manner. This book is of interest to both digital forensic educators and digital forensic practitioners, as well as students seeking to learn about digital forensics.

National Cyber Summit (NCS) Research Track 2020 (Paperback, 1st ed. 2021): Kim-Kwang Raymond Choo, Tommy Morris, Gilbert L.... National Cyber Summit (NCS) Research Track 2020 (Paperback, 1st ed. 2021)
Kim-Kwang Raymond Choo, Tommy Morris, Gilbert L. Peterson, Eric Imsand
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit's Research Track, reporting on the latest advances on topics ranging from software security to cyber attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures that users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators, and practitioners, as well as students seeking to learn about cyber security.

National Cyber Summit (NCS) Research Track (Paperback, 1st ed. 2020): Kim-Kwang Raymond Choo, Thomas H. Morris, Gilbert L.... National Cyber Summit (NCS) Research Track (Paperback, 1st ed. 2020)
Kim-Kwang Raymond Choo, Thomas H. Morris, Gilbert L. Peterson
R2,797 Discovery Miles 27 970 Ships in 10 - 15 working days

These proceedings gather papers presented at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit's Research Track, and report on the latest advances in areas ranging from software security to cyber attack detection and modeling; the use of machine learning in cyber security; legislation and policy; surveying small businesses; cyber competition, and so on. Understanding the latest capabilities in cyber security is the best way to prepare users and organizations for potential negative events. Consequently, this book will be of interest to cyber security researchers, educators and practitioners, as well as students who want to learn about cyber security.

National Cyber Summit (NCS) Research Track 2021 (Paperback, 1st ed. 2022): Kim-Kwang Raymond Choo, Tommy Morris, Gilbert... National Cyber Summit (NCS) Research Track 2021 (Paperback, 1st ed. 2022)
Kim-Kwang Raymond Choo, Tommy Morris, Gilbert Peterson, Eric Imsand
R2,484 Discovery Miles 24 840 Ships in 12 - 17 working days

This book presents findings from the papers accepted at the Cyber Security Education Stream and Cyber Security Technology Stream of The National Cyber Summit's Research Track, reporting on latest advances on topics ranging from software security to cyber-attack detection and modelling to the use of machine learning in cyber security to legislation and policy to surveying of small businesses to cyber competition, and so on. Understanding the latest capabilities in cyber security ensures users and organizations are best prepared for potential negative events. This book is of interest to cyber security researchers, educators and practitioners, as well as students seeking to learn about cyber security.

Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence (Paperback, 1st ed. 2018): Darren Quick,... Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence (Paperback, 1st ed. 2018)
Darren Quick, Kim-Kwang Raymond Choo
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings (Paperback, 1st ed. 2017)
Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo
R3,220 Discovery Miles 32 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings (Paperback, 1st ed. 2017)
Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications SCS 2017: The Third International Symposium on Sensor-Cloud Systems WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Air Fryer - Herman's Top 100 Recipes
Herman Lensing Paperback R350 R235 Discovery Miles 2 350
Implementing the ISO/IEC 27001…
Edward Humphreys Hardcover R2,327 Discovery Miles 23 270
Safari Nation - A Social History Of The…
Jacob Dlamini Paperback R320 R250 Discovery Miles 2 500
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,232 Discovery Miles 32 320
Multimedia Forensics and Security
Chang-Tsun Li Hardcover R4,865 Discovery Miles 48 650
Certification and Security in E-Services…
Enrico Nardelli, Sabina Posadziejewski, … Hardcover R2,961 Discovery Miles 29 610
Kryptowahrungen fur Dummies
K Soeteman Paperback R405 Discovery Miles 4 050
Twice The Glory - The Making Of The…
Lloyd Burnard, Khanyiso Tshwaku Paperback R325 R219 Discovery Miles 2 190
Falling Monuments, Reluctant Ruins - The…
Hilton Judin Paperback R875 R774 Discovery Miles 7 740
Waterboy - Making Sense Of My Son's…
Glynis Horning Paperback R320 R250 Discovery Miles 2 500

 

Partners