0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Cybersecurity Teaching in Higher Education (Hardcover, 1st ed. 2023): Leslie F Sikos, Paul Haskell-Dowland Cybersecurity Teaching in Higher Education (Hardcover, 1st ed. 2023)
Leslie F Sikos, Paul Haskell-Dowland
R4,229 Discovery Miles 42 290 Ships in 12 - 19 working days

This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the increasing number and impact of cyberattacks, there is a growing demand for cybersecurity courses in higher education. More and more educational institutions offer cybersecurity courses, which come with unique and constantly evolving challenges not known in other disciplines. For example, step-by-step guides may not work for some of the students if the configuration of a computing environment is not identical or similar enough to the one the workshop material is based on, which can be a huge problem for blended and online delivery modes. Using nested virtualization in a cloud infrastructure might not be authentic for all kinds of exercises, because some of its characteristics can be vastly different from an enterprise network environment that would be the most important to demonstrate to students. The availability of cybersecurity datasets for training and educational purposes can be limited, and the publicly available datasets might not suit a large share of training materials, because they are often excessively documented, but not only by authoritative websites, which render these inappropriate for assignments and can be misleading for online students following training workshops and looking for online resources about datasets such as the Boss of the SOC (BOTS) datasets. The constant changes of Kali Linux make it necessary to regularly update training materials, because commands might not run the same way they did a couple of months ago. The many challenges of cybersecurity education are further complicated by the continuous evolution of networking and cloud computing, hardware and software, which shapes student expectations: what is acceptable and respected today might be obsolete or even laughable tomorrow.

Cybersecurity for Smart Cities - Practices and Challenges (Hardcover, 1st ed. 2023): Mohiuddin Ahmed, Paul Haskell-Dowland Cybersecurity for Smart Cities - Practices and Challenges (Hardcover, 1st ed. 2023)
Mohiuddin Ahmed, Paul Haskell-Dowland
R4,922 Discovery Miles 49 220 Ships in 12 - 19 working days

Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities.

Next-Generation Enterprise Security and Governance (Hardcover): Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland Next-Generation Enterprise Security and Governance (Hardcover)
Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland
R2,732 Discovery Miles 27 320 Ships in 12 - 19 working days

The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.

Secure Edge Computing - Applications, Techniques and Challenges (Hardcover): Mohiuddin Ahmed, Paul Haskell-Dowland Secure Edge Computing - Applications, Techniques and Challenges (Hardcover)
Mohiuddin Ahmed, Paul Haskell-Dowland
R3,137 Discovery Miles 31 370 Ships in 12 - 19 working days

This book will address the cyber security challenges associated with edge computing, which will provide a bigger picture on the concepts, techniques, applications, and open research directions in this area. The book will serve as a single source of reference for acquiring the knowledge on the technology, process and people involved in the next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pragmatic Enterprise Architecture…
James Luisi Paperback R1,095 Discovery Miles 10 950
Targeted Nanomedicine for Breast Cancer…
Shivani Rai Paliwal, Rishi Paliwal Paperback R4,773 Discovery Miles 47 730
Walt Disney's Disneyland
Chris Nichols Hardcover  (1)
R1,338 R1,121 Discovery Miles 11 210
MIS
Hossein Bidgoli Paperback R1,244 R1,160 Discovery Miles 11 600
Steinheist - Markus Jooste, Steinhoff…
Rob Rose Paperback  (1)
R395 R370 Discovery Miles 3 700
Catalogue of Selected Angiosperm Pollen…
Surya Kant Mani Tripathi Hardcover R3,636 Discovery Miles 36 360
Building Magic - Disney's Overseas Theme…
William Silvester Hardcover R1,037 Discovery Miles 10 370
Theoretical and Applied Mathematics in…
Bryan Christiansen, Fatima Shuwaikh Hardcover R6,747 Discovery Miles 67 470
Theme Park Babylon
Dale M. Brumfield Paperback R304 Discovery Miles 3 040
Business Statistics Using Excel
Glyn Davis, Branko Pecar, … Paperback R721 Discovery Miles 7 210

 

Partners