0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.): Salvatore J Stolfo, Steven M. Bellovin, Shlomo... Insider Attack and Cyber Security - Beyond the Hacker (Hardcover, 2008 ed.)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Trusted Computing Platforms - Design and Applications (Hardcover, 2005 ed.): Sean W Smith Trusted Computing Platforms - Design and Applications (Hardcover, 2005 ed.)
Sean W Smith
R2,788 Discovery Miles 27 880 Ships in 18 - 22 working days

From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security

Including real case study experience with security architecture and applications on multiple types of platforms.

Examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform.

Examines more recent cutting-edge experimental work in this area.

Written for security architects, application designers, and the general computer scientist interested in the evolution and use of this emerging technology.

Insider Attack and Cyber Security - Beyond the Hacker (Paperback, Softcover reprint of hardcover 1st ed. 2008): Salvatore J... Insider Attack and Cyber Security - Beyond the Hacker (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.

This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Trusted Computing Platforms - Design and Applications (Paperback): Sean W Smith Trusted Computing Platforms - Design and Applications (Paperback)
Sean W Smith
R2,615 Discovery Miles 26 150 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Crochet Patterns - Complete Step-by-Step…
Alexia Cassie Hardcover R707 Discovery Miles 7 070
Using Event-B for Critical Device…
Neeraj Kumar Singh Hardcover R4,255 R3,449 Discovery Miles 34 490
Pragmatist Democracy - Evolutionary…
Christopher Ansell Hardcover R1,913 Discovery Miles 19 130
Artificial Intelligence Technologies for…
Ranjeet Kumar Rout, Saiyed Umer, … Hardcover R3,807 Discovery Miles 38 070
The Neo-liberal State
Raymond Plant Hardcover R3,173 Discovery Miles 31 730
Networking Technologies in Smart…
Pooja Singh, Omprakash Kaiwartya, … Hardcover R4,803 Discovery Miles 48 030
Emerging Technologies for Semantic Work…
Jorg Rech, Bjorn Decker, … Hardcover R4,591 Discovery Miles 45 910
Probation - 12 Essential Questions
Fergus McNeill, Ioan Durnescu, … Hardcover R1,882 Discovery Miles 18 820
Agile Software Development - Evaluating…
Alan S. Koch Hardcover R2,247 Discovery Miles 22 470
Personality and Peer Influence in…
Martin Gold, D. Wayne Osgood Hardcover R2,567 Discovery Miles 25 670

 

Partners