0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Innovations In Digital Forensics: Suryadipta Majumdar, Paria Shirani, Lingyu Wang Innovations In Digital Forensics
Suryadipta Majumdar, Paria Shirani, Lingyu Wang
R3,695 Discovery Miles 36 950 Ships in 10 - 15 working days

Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will continue to do so in the near future.This book presents state-of-the-art techniques to address imminent challenges in digital forensics. In particular, it focuses on cloud forensics, Internet-of-Things (IoT) forensics, and network forensics, elaborating on innovative techniques, including algorithms, implementation details and performance analysis, to demonstrate their practicality and efficacy. The innovations presented in this volume are designed to help various stakeholders with the state-of-the-art digital forensics techniques to understand the real world problems. Lastly, the book will answer the following questions: How do the innovations in digital forensics evolve with the emerging technologies? What are the newest challenges in the field of digital forensics?

Cloud Security Auditing (Hardcover, 1st ed. 2019): Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily,... Cloud Security Auditing (Hardcover, 1st ed. 2019)
Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, …
R3,431 Discovery Miles 34 310 Ships in 10 - 15 working days

This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers' views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants' trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP). This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.

Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud... Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings (1st ed. 2023)
Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, …
R2,685 Discovery Miles 26 850 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: ¡  1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) ¡        5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) ¡        4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) ¡        5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) ¡        3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) ¡        5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) ¡        4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) ¡        4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) ¡        5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)

Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings... Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar
R3,320 Discovery Miles 33 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022. The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P,... Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings (Paperback, 1st ed. 2022)
Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, …
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops: - AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security - AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security - AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security - CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security - Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy - SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation - SecMT: 3rd ACNS Workshop on Security in Mobile Technologies - SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications

Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P,... Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings (Paperback, 1st ed. 2021)
Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, …
R2,747 Discovery Miles 27 470 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.The 26 papers presented in this volume were carefully reviewed and selected from 49 submissions. They stem from the following workshops: AIBlock 2021: Third International Workshop on Application Intelligence and Blockchain Security AIHWS 2021: Second International Workshop on Artificial Intelligence in Hardware Security AIoTS 2021: Third International Workshop on Artificial Intelligence and Industrial IoT Security CIMSS 2021: First International Workshop on Critical Infrastructure and Manufacturing System Security Cloud S&P 2021: Third International Workshop on Cloud Security and Privacy SCI 2021: Second International Workshop on Secure Cryptographic Implementation SecMT 2021: Second International Workshop on Security in Mobile Technologies SiMLA 2021; Third International Workshop on Security in Machine Learning and its Applications Due to the Corona pandemic the workshop was held as a virtual event.

Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020,... Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings (Paperback, 1st ed. 2021)
Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar
R2,675 Discovery Miles 26 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19 pandemic the conference was held virtually. The 11 reviewed full papers and 4 short papers were selected from 35 submissions and are grouped in topical sections on digital forensics; cyber-physical system Forensics; event reconstruction in digital forensics; emerging topics in forensics; cybersecurity and digital forensics.

Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI,... Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings (Paperback, 1st ed. 2020)
Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man-Ho Au, Lejla Batina, …
R3,272 Discovery Miles 32 720 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020: Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020: First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020: Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020: Second International Workshop on Cloud Security and Privacy SCI 2020: First International Workshop on Secure Cryptographic Implementation SecMT 2020: First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications

Cloud Security Auditing (Paperback, 1st ed. 2019): Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily,... Cloud Security Auditing (Paperback, 1st ed. 2019)
Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, …
R2,675 Discovery Miles 26 750 Ships in 10 - 15 working days

This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers' views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants' trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP). This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.

Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS,... Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings (Paperback, 1st ed. 2019)
Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, …
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain SecurityAIoTS 2019:First International Workshop on Articial Intelligence and Industrial Internet-of-Things SecurityCloud S&P 2019:First International Workshop on Cloud Security and PrivacyPriDA 2019:First InternationalWorkshop on Privacy-preserving Distributed Data AnalysisSiMLA 2019: First International Workshop on Security in Machine Learning and its Applications

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ergonomicsdirect Ergo Anywhere Swivel…
R389 R299 Discovery Miles 2 990
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
She Said
Carey Mulligan, Zoe Kazan, … DVD R93 Discovery Miles 930
Infantino Animal Counting Book
R170 R159 Discovery Miles 1 590
Complete Adult Cat Food (3kg)
R215 R185 Discovery Miles 1 850
Goldair GBF-809 Rechargeable Box Fan…
R454 Discovery Miles 4 540
Vital BabyŽ NOURISH™ Store And Wean…
R155 R95 Discovery Miles 950
Tenet
John David Washington, Robert Pattinson Blu-ray disc  (1)
R50 Discovery Miles 500

 

Partners