0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (2)
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Cyberterrorism - Understanding, Assessment, and Response (Paperback, Softcover reprint of the original 1st ed. 2014): Thomas M.... Cyberterrorism - Understanding, Assessment, and Response (Paperback, Softcover reprint of the original 1st ed. 2014)
Thomas M. Chen, Lee Jarvis, Stuart MacDonald
R2,626 Discovery Miles 26 260 Ships in 10 - 15 working days

This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.

Terrorism Online - Politics, Law and Technology (Paperback): Lee Jarvis, Stuart MacDonald, Thomas M. Chen Terrorism Online - Politics, Law and Technology (Paperback)
Lee Jarvis, Stuart MacDonald, Thomas M. Chen
R1,288 Discovery Miles 12 880 Ships in 12 - 17 working days

This book investigates the intersection of terrorism, digital technologies and cyberspace. The evolving field of cyber-terrorism research is dominated by single-perspective, technological, political, or sociological texts. In contrast, Terrorism Online uses a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or addressed? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists and protest activities associated with 'hacktivist' groups to state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach to cyberterrorism which provides a unique and invaluable contribution to this subject matter. This book will be of great interest to students of cybersecurity, security studies, terrorism and International Relations.

Forward Error Correction Based On Algebraic-Geometric Theory (Paperback, 2014 ed.): Jafar A. Alzubi, Omar A. Alzubi, Thomas M.... Forward Error Correction Based On Algebraic-Geometric Theory (Paperback, 2014 ed.)
Jafar A. Alzubi, Omar A. Alzubi, Thomas M. Chen
R1,761 Discovery Miles 17 610 Ships in 10 - 15 working days

This book covers the design, construction, and implementation of algebraic-geometric codes from Hermitian curves. Matlab simulations of algebraic-geometric codes and Reed-Solomon codes compare their bit error rate using different modulation schemes over additive white Gaussian noise channel model. Simulation results of Algebraic-geometric codes bit error rate performance using quadrature amplitude modulation (16QAM and 64QAM) are presented for the first time and shown to outperform Reed-Solomon codes at various code rates and channel models. The book proposes algebraic-geometric block turbo codes. It also presents simulation results that show an improved bit error rate performance at the cost of high system complexity due to using algebraic-geometric codes and Chase-Pyndiah's algorithm simultaneously. The book proposes algebraic-geometric irregular block turbo codes (AG-IBTC) to reduce system complexity. Simulation results for AG-IBTCs are presented for the first time.

Cyberterrorism - Understanding, Assessment, and Response (Hardcover, 2014 ed.): Thomas M. Chen, Lee Jarvis, Stuart MacDonald Cyberterrorism - Understanding, Assessment, and Response (Hardcover, 2014 ed.)
Thomas M. Chen, Lee Jarvis, Stuart MacDonald
R3,891 Discovery Miles 38 910 Ships in 10 - 15 working days

This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.

Terrorism Online - Politics, Law and Technology (Hardcover): Lee Jarvis, Stuart MacDonald, Thomas M. Chen Terrorism Online - Politics, Law and Technology (Hardcover)
Lee Jarvis, Stuart MacDonald, Thomas M. Chen
R4,582 Discovery Miles 45 820 Ships in 12 - 17 working days

This book investigates the intersection of terrorism, digital technologies and cyberspace. The evolving field of cyber-terrorism research is dominated by single-perspective, technological, political, or sociological texts. In contrast, Terrorism Online uses a multi-disciplinary framework to provide a broader introduction to debates and developments that have largely been conducted in isolation. Drawing together key academics from a range of disciplinary fields, including Computer Science, Engineering, Social Psychology, International Relations, Law and Politics, the volume focuses on three broad themes: 1) how - and why - do terrorists engage with the Internet, digital technologies and cyberspace?; 2) what threat do these various activities pose, and to whom?; 3) how might these activities be prevented, deterred or addressed? Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism: from lone-actor terrorists and protest activities associated with 'hacktivist' groups to state-based terrorism. Through the book's engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach to cyberterrorism which provides a unique and invaluable contribution to this subject matter. This book will be of great interest to students of cybersecurity, security studies, terrorism and International Relations.

Cyberterrorism After Stuxnet (Paperback): Strategic Studies Institute, Thomas M. Chen, U S. Army War College Cyberterrorism After Stuxnet (Paperback)
Strategic Studies Institute, Thomas M. Chen, U S. Army War College
R393 Discovery Miles 3 930 Ships in 10 - 15 working days

Public government statements have cited cyberattacks by terrorists as a major concern for national security. To date, no large-scale cyber-terrorist attack has been observed, but terrorists are known to be using the Internet for various routine purposes. The discovery of Stuxnet in 2010 was a milestone in the arena of cybersecurity because, although a malware attack on industrial control systems was long believed to be theoretically possible, it was different to see malware used in reality to cause real physical damage. Stuxnet demonstrated that a sufficiently determined adversary with sufficient resources might be able to damage U.S. critical infrastructure physically through a cyber attack. Did Stuxnet change the threat of cyberterrorism?

An Assessment of The Department of Defense Strategy for Operating In Cyberspace (Paperback): Thomas M. Chen, Strategic Studies... An Assessment of The Department of Defense Strategy for Operating In Cyberspace (Paperback)
Thomas M. Chen, Strategic Studies Institute, U S. Army War College
R459 Discovery Miles 4 590 Ships in 10 - 15 working days

In July 2011, the U.S. Department of Defense (DoD) issued the DoD Strategy for Operating in Cyberspace, which outlines five strategic initiatives: 1) Treat cyberspace as another operational domain; 2) Employ new defense operating concepts to pro--tect DoD networks; 3) Partner with other U.S. government agencies and the private sector; 4) Build relationships with U.S. allies and interna--tional partners to strengthen cyber security; and, 5). Leverage the national intellect and capabilities through cyber workforce training and rapid techno--logical innovation. First , the monograph explores the evolution of cyberspace strategy through a series of government publications leading up to the DoD Strategy for Operating in Cyber--space. It is seen that, although each strategy has differ--ent emphases on ideas, some major themes recur. Second, each strategic initiative is elaborated and critiqued in terms of significance, novelty, and practicality. Third, the monograph critiques the DoD Strategy as a whole.

Broadband Mobile Multimedia - Techniques and Applications (Hardcover): Yan Zhang, Shiwen Mao, Laurence T. Yang, Thomas M. Chen Broadband Mobile Multimedia - Techniques and Applications (Hardcover)
Yan Zhang, Shiwen Mao, Laurence T. Yang, Thomas M. Chen
R3,724 Discovery Miles 37 240 Ships in 12 - 17 working days

Multimedia service provisioning is believed to be one of the prerequisites to guarantee the success of next-generation wireless networks. Examining the role of multimedia in state-of-the-art wireless systems and networks, Broadband Mobile Multimedia: Techniques and Applications presents a collection of introductory concepts, fundamental techniques, the latest advances, and open issues in this important area.

Divided into four sections, the volume begins with an introduction to various broadband wireless multimedia systems. Using video as an application example, it then focuses on the routing and cross-layer design issue of multimedia communication over multihop wireless ad hoc and sensor networks. The next section discusses issues related to multimedia communications over WLANs-a dominant part of today's broadband wireless access networks. The book concludes with recent developments in quality-of-service (QoS) provisioning mechanisms and other enabling technologies, including middleware, mobility management, scheduling, and power control.

With numerous illustrative figures and extensive references, this useful technical guide gives in-depth treatments of basic topics, a solid overview of cutting-edge advances, and a representative sampling of important research outcomes.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sizzlers - The Hate Crime That Tore Sea…
Nicole Engelbrecht Paperback R320 R235 Discovery Miles 2 350
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Shield Sheen Silicone (500ml)
R77 Discovery Miles 770
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Pure Pleasure Non-Fitted Electric…
 (16)
R289 Discovery Miles 2 890
Bostik Sew Simple (25ml)
R31 Discovery Miles 310
Croxley CREATE Fibre Tip Khokis (12…
R43 Discovery Miles 430
Efekto Karbadust Insecticide Dusting…
R54 Discovery Miles 540

 

Partners