Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types The security practitioner's toolbox: Identification and authentication, access control, and cryptography Areas of practice: Securing programs, user–internet interaction, operating systems, networks, data, databases, and cloud computing Cross-cutting disciplines: Privacy, management, law, and ethics Using cryptography: Formal and mathematical underpinnings, and applications of cryptography Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.
As we become increasingly dependent on digital products in all aspects of our lives, the reliability of that technology increases in importance. Technological security can be thought of as the control of access to technical systems and the control of the use of those systems. However, the way that digital technologies are woven across the fabric of our everyday lives, and are embedded in all our institutions, means that we need a paradigm for understanding technological security as being part of other forms of security. This monograph introduces the paradigm of digital security that not only encompasses the protection of digital technologies and the data it produces but also the practices and processes that link those technologies. It encompasses the political and social processes and practices that shape the meanings and experiences of the digital protection mechanisms. In a digitally mediated society, security of the state, of society, of individuals, and of technologies are bound together through these processes and practices, giving new security meanings to security technologies and policies. Grounded in the interdisciplinary endeavours that characterise Web Science, this monograph presents the case for this more inclusive form of technological security. Such a security places the security of technology in the context of the security of people operating in a web-enabled and digitally-connected society and results in a digital security that responds to the enmeshed nature of technology and society. This monograph situates digital security within the broader landscape of social and political theories of security, and uses a critical security lens to encourage the reader to explore how digitally networked technologies are both included in and influenced by the co-creation of artefacts and practices in open environments.
|
You may like...
Terminator 6: Dark Fate
Linda Hamilton, Arnold Schwarzenegger
Blu-ray disc
(1)
R76 Discovery Miles 760
|