0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,979)
  • R250 - R500 (801)
  • R500+ (4,710)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover): Clement Guitton Inside the Enemy's Computer - Identifying Cyber Attackers (Hardcover)
Clement Guitton
R776 R679 Discovery Miles 6 790 Save R97 (13%) Ships in 10 - 15 working days

Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.

Advances in Multimedia Information Processing - PCM 2018 - 19th Pacific-Rim Conference on Multimedia, Hefei, China, September... Advances in Multimedia Information Processing - PCM 2018 - 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Richang Hong, Wen-Huang Cheng, Toshihiko Yamasaki, Meng Wang, Chong-Wah Ngo
R2,707 R2,084 Discovery Miles 20 840 Save R623 (23%) Ships in 10 - 15 working days

The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018. The 209 regular papers presented together with 20 special session papers were carefully reviewed and selected from 452 submissions. The papers cover topics such as: multimedia content analysis; multimedia signal processing and communications; and multimedia applications and services.

Network Security Assessment 3e (Paperback): Chris McNab Network Security Assessment 3e (Paperback)
Chris McNab
R1,190 R702 Discovery Miles 7 020 Save R488 (41%) Ships in 10 - 15 working days

How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities, and the steps you can take to identify them in your environment. System complexity and attack surfaces continue to grow. This book provides a process to help you mitigate risks posed to your network. Each chapter includes a checklist summarizing attacker techniques, along with effective countermeasures you can use immediately. Learn how to effectively test system components, including: Common services such as SSH, FTP, Kerberos, SNMP, and LDAP Microsoft services, including NetBIOS, SMB, RPC, and RDP SMTP, POP3, and IMAP email services IPsec and PPTP services that provide secure network access TLS protocols and features providing transport security Web server software, including Microsoft IIS, Apache, and Nginx Frameworks including Rails, Django, Microsoft ASP.NET, and PHP Database servers, storage protocols, and distributed key-value stores

Hacker Culture and the New Rules of Innovation (Paperback): Tim Rayner Hacker Culture and the New Rules of Innovation (Paperback)
Tim Rayner
R868 Discovery Miles 8 680 Ships in 10 - 15 working days

Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company's innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world's most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.

Business Information Systems Workshops - BIS 2020 International Workshops, Colorado Springs, CO, USA, June 8-10, 2020, Revised... Business Information Systems Workshops - BIS 2020 International Workshops, Colorado Springs, CO, USA, June 8-10, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Witold Abramowicz, Gary Klein
R1,715 Discovery Miles 17 150 Ships in 7 - 11 working days

This book constitutes revised papers from the five workshops which were held during June 2020 at the 23rd International Conference on Business Information Systems, BIS 2020. The conference was planned to take place in Colorado Springs, CO, USA. Due to the COVID-19 pandemic it changed to a virtual format. There was a total of 54 submissions to all workshops of which 26 papers were accepted for publication. The workshops included in this volume are: BITA 2020: 11th Workshop on Business and IT Alignment BSCT 2020: 3rd Workshop on Blockchain and Smart Contract Technologies DigEX 2020: 2nd International Workshop on transforming the Digital Customer Experience iCRM 2020: 5th International Workshop on Intelligent Data Analysis in Integrated Social CRM QOD 2020: 3rd Workshop on Quality of Open Data

Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - A Decision and Game Theoretic Approach (Hardcover, 1st ed.... Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - A Decision and Game Theoretic Approach (Hardcover, 1st ed. 2020)
Quanyan Zhu, Zhiheng Xu
R3,764 Discovery Miles 37 640 Ships in 7 - 11 working days

This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book bridges the gap between cryptography and control-theoretic tools. It develops a bespoke crypto-control framework to address security and resiliency in control and estimation problems where the outsourcing of computations is possible. Part III of this book bridges the gap between game theory and control theory and develops interdependent impact-aware security defense strategies and cyber-aware resilient control strategies. With the rapid development of smart cities, there is a growing need to integrate the physical systems, ranging from large-scale infrastructures to small embedded systems, with networked communications. The integration of the physical and cyber systems forms Cyber-Physical Systems (CPSs), enabling the use of digital information and control technologies to improve the monitoring, operation, and planning of the systems. Despite these advantages, they are vulnerable to cyber-physical attacks, which aim to damage the physical layer through the cyber network. This book also uses case studies from autonomous systems, communication-based train control systems, cyber manufacturing, and robotic systems to illustrate the proposed methodologies. These case studies aim to motivate readers to adopt a cross-layer system perspective toward security and resilience issues of large and complex systems and develop domain-specific solutions to address CPS challenges. A comprehensive suite of solutions to a broad range of technical challenges in secure and resilient control systems are described in this book (many of the findings in this book are useful to anyone working in cybersecurity). Researchers, professors, and advanced-level students working in computer science and engineering will find this book useful as a reference or secondary text. Industry professionals and military workers interested in cybersecurity will also want to purchase this book.

Smart Innovations in Communication and Computational Sciences - Proceedings of ICSICCS 2017, Volume 2 (Paperback, 1st ed.... Smart Innovations in Communication and Computational Sciences - Proceedings of ICSICCS 2017, Volume 2 (Paperback, 1st ed. 2019)
Bijaya Ketan Panigrahi, Munesh C. Trivedi, Krishn K. Mishra, Shailesh Tiwari, Pradeep Kumar Singh
R3,502 R3,125 Discovery Miles 31 250 Save R377 (11%) Ships in 10 - 15 working days

The book provides insights into International Conference on Smart Innovations in Communications and Computational Sciences (ICSICCS 2017) held at North West Group of Institutions, Punjab, India. It presents new advances and research results in the fields of computer and communication written by leading researchers, engineers and scientists in the domain of interest from around the world. The book includes research work in all the areas of smart innovation, systems and technologies, embedded knowledge and intelligence, innovation and sustainability, advance computing, networking and informatics. It also focuses on the knowledge-transfer methodologies and innovation strategies employed to make this happen effectively. The combination of intelligent systems tools and a broad range of applications introduce a need for a synergy of disciplines from science and technology. Sample areas include, but are not limited to smart hardware, software design, smart computing technologies, intelligent communications and networking, web and informatics and computational sciences.

CompTIA PenTest+ Practice Tests - Exam PT0-001 (Paperback): Crystal Panek, Robb Tracy CompTIA PenTest+ Practice Tests - Exam PT0-001 (Paperback)
Crystal Panek, Robb Tracy
R817 R560 Discovery Miles 5 600 Save R257 (31%) Ships in 10 - 15 working days

The must-have test prep for the new CompTIA PenTest+ certification CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cognitive and hands-on skills are required worldwide to responsibly perform assessments of IT systems, identify weaknesses, manage the vulnerabilities, and determine if existing cybersecurity practices deviate from accepted practices, configurations and policies. Five unique 160-question practice tests Tests cover the five CompTIA PenTest+ objective domains Two additional 100-question practice exams A total of 1000 practice test questions This book helps you gain the confidence you need for taking the CompTIA PenTest+ Exam PT0-001. The practice test questions prepare you for test success.

Blockchain and the Law - The Rule of Code (Hardcover): Primavera de Filippi, Aaron Wright Blockchain and the Law - The Rule of Code (Hardcover)
Primavera de Filippi, Aaron Wright
R850 R734 Discovery Miles 7 340 Save R116 (14%) Ships in 10 - 15 working days

Since Bitcoin appeared in 2009, the digital currency has been hailed as an Internet marvel and decried as the preferred transaction vehicle for all manner of criminals. It has left nearly everyone without a computer science degree confused: Just how do you "mine" money from ones and zeros? The answer lies in a technology called blockchain, which can be used for much more than Bitcoin. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet itself in both form and impact. Some have said this tool may change society as we know it. Blockchains are being used to create autonomous computer programs known as "smart contracts," to expedite payments, to create financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. The technology could affect governance itself, by supporting new organizational structures that promote more democratic and participatory decision making. Primavera De Filippi and Aaron Wright acknowledge this potential and urge the law to catch up. That is because disintermediation-a blockchain's greatest asset-subverts critical regulation. By cutting out middlemen, such as large online operators and multinational corporations, blockchains run the risk of undermining the capacity of governmental authorities to supervise activities in banking, commerce, law, and other vital areas. De Filippi and Wright welcome the new possibilities inherent in blockchains. But as Blockchain and the Law makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking.

Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence (Paperback, 1st ed. 2018): Darren Quick,... Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence (Paperback, 1st ed. 2018)
Darren Quick, Kim-Kwang Raymond Choo
R1,248 R1,141 Discovery Miles 11 410 Save R107 (9%) Ships in 10 - 15 working days

This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.

(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide (Paperback, 2nd Edition): Mike Wills (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide (Paperback, 2nd Edition)
Mike Wills
R1,234 R817 Discovery Miles 8 170 Save R417 (34%) Ships in 10 - 15 working days

The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. This comprehensive Official Study Guide--the only study guide officially approved by (ISC)2--covers all objectives of the seven SSCP domains. Access Controls Security Operations and Administration Risk Identification, Monitoring, and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.

Security with Intelligent Computing and Big-data Services (Paperback, 1st ed. 2018): Sheng-Lung Peng, Shiuh-Jeng Wang,... Security with Intelligent Computing and Big-data Services (Paperback, 1st ed. 2018)
Sheng-Lung Peng, Shiuh-Jeng Wang, Valentina Emilia Balas, Ming Zhao
R1,523 R1,387 Discovery Miles 13 870 Save R136 (9%) Ships in 10 - 15 working days

In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.

On Thin Ice (Hardcover): Leading Cybersecurity Experts On Thin Ice (Hardcover)
Leading Cybersecurity Experts
R533 Discovery Miles 5 330 Ships in 7 - 11 working days
The Virtual Weapon and International Order (Paperback): Lucas Kello The Virtual Weapon and International Order (Paperback)
Lucas Kello
R399 R351 Discovery Miles 3 510 Save R48 (12%) Ships in 10 - 15 working days

An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual frameworks for understanding its effects on international order The cyber revolution is the revolution of our time. The rapid expansion of cyberspace in society brings both promise and peril. It promotes new modes of political cooperation, but it also disrupts interstate dealings and empowers subversive actors who may instigate diplomatic and military crises. Despite significant experience with cyber incidents, the conceptual apparatus to analyze, understand, and address their effects on international order remains primitive. Here, Lucas Kello adapts and applies international relations theory to create new ways of thinking about cyber strategy. Kello draws on a broad range of case studies - including the Stuxnet operation against Iran, the cyberattacks against Sony Pictures, and the disruption of the 2016 U.S. presidential election - to make sense of the contemporary technological revolution. Synthesizing data from government documents, forensic reports of major events, and interviews with senior decision-makers, this important work establishes new theoretical benchmarks to help security experts revise strategy and policy for the unprecedented challenges of our era.

Adversary Detection For Cognitive Radio Networks (Paperback, 1st ed. 2018): Xiaofan He, Huaiyu Dai Adversary Detection For Cognitive Radio Networks (Paperback, 1st ed. 2018)
Xiaofan He, Huaiyu Dai
R1,331 R1,224 Discovery Miles 12 240 Save R107 (8%) Ships in 10 - 15 working days

This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems. In addition, detailed discussions of the underlying fundamental analytical tools and engineering methodologies of these adversary detection techniques are provided, considering that many of them are quite general and have been widely employed in many other related fields. The exposition of this book starts from a brief introduction of the CR technology and spectrum sensing in Chapter 1. This is followed by an overview of the relevant security vulnerabilities and a detailed discussion of two security threats unique to CR networks, namely, the primary user emulation (PUE) attack and the Byzantine attack. To better prepare the reader for the discussions in later chapters, preliminaries of analytic tools related to adversary detection are introduced in Chapter 2. In Chapter 3, a suite of cutting-edge adversary detection techniques tailor-designed against the PUE and the Byzantine attacks are reviewed to provide a clear overview of existing research in this field. More detailed case studies are presented in Chapters 4 - 6. Specifically, a physical-layer based PUE attack detection scheme is presented in Chapter 4, while Chapters 5 and 6 are devoted to the illustration of two novel detection techniques against the Byzantine attack. Concluding remarks and outlooks for future research are provided in Chapter 7. The primary audience for this SpringerBrief include network engineers interested in addressing adversary detection issues in cognitive radio networks, researchers interested in the state-of-the-art on unique security threats to cognitive radio networks and the corresponding detection mechanisms. Also, graduate and undergraduate students interested in obtaining comprehensive information on adversary detection in cognitive radio networks and applying the underlying techniques to address relevant research problems can use this SpringerBrief as a study guide.

Dynamic Games for Network Security (Paperback, 1st ed. 2018): Xiaofan He, Huaiyu Dai Dynamic Games for Network Security (Paperback, 1st ed. 2018)
Xiaofan He, Huaiyu Dai
R1,331 R1,224 Discovery Miles 12 240 Save R107 (8%) Ships in 10 - 15 working days

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3-5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender's benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.

Cyber Self-Defense - Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying (Paperback): Alexis Moore,... Cyber Self-Defense - Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying (Paperback)
Alexis Moore, Laurie Edwards
R342 R319 Discovery Miles 3 190 Save R23 (7%) Ships in 7 - 11 working days

According to the U.S .Department of Justice, more than six million people are stalked each year in the United States alone. Don't become one of them International cybercrime expert Alexis Moore can help protect you from the spurned lovers, angry neighbors, and jealous coworkers who use the Internet as the perfect way to exact revenge and wreak havoc on your life. In her essential book, she introduces the ten most common personality profiles of cyberstalkers--such as Attention-Getting, Jealous, Manipulative, Controlling, and Narcissistic--and their threatening online behaviors. Each chapter includes a quiz to help you identify the signs of that personality type in order to determine if you are in a potentially vulnerable relationship. Case studies illustrate how that particular cybercriminal operates, and Moore offers tips to prevent and/or recover from each type of cybercrime. She also provides strategies to help victims protect themselves, reestablish their reputations and credentials, recover from financial losses, and rebuild their lives. The techniques range from recovering data, monitoring online profiles and social media information, and regaining self-esteem to changing identities and even going underground.

Achieving and Sustaining Secured Business Operations - An Executive's Guide to Planning and Management (Paperback, 1st... Achieving and Sustaining Secured Business Operations - An Executive's Guide to Planning and Management (Paperback, 1st ed.)
Neelesh Ajmani, Dinesh Kumar
R814 R699 Discovery Miles 6 990 Save R115 (14%) Ships in 10 - 15 working days

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. Securing company operations is a board-level discussion. Across all industries, companies are pouring millions of dollars into taming cybercrime and other related security crime. Achieving and Sustaining Secured Business Operations presents a holistic approach looking top down, bottom up, and sideways. The end goal is to achieve and sustain a safe environment to conduct secured business operations while continuously innovating for competitive advantage. What You'll Learn Discover why security, specifically secured business operations, needs to be part of business planning and oversight by design and not left to technologists to make the business case Determine what you can do in your role and in your organization to drive and implement integration and improvements in planning and managing secured business operations in conjunction with other business planning and management activities Choose ways in which progress toward achieving and sustaining secured business operations can be measured Understand best practices for organizing, planning, architecting, governing, monitoring, and managing secured business operations Create a framework, including methods and tools for operationalizing assessment, planning, and ongoing management of secured business operations Use cases and potential case studies for various industries and business models Who This Book Is For Chief executive officers and their leadership team; chief operations officers; chief information officers and their leadership team; chief information security officers; business functional middle managers; and enterprise, solution, and information technology architects

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXV (Paperback, 1st ed. 2017): Abdelkader Hameurlain, Josef... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXV (Paperback, 1st ed. 2017)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Sherif Sakr, Imran Razzak, …
R1,760 R1,609 Discovery Miles 16 090 Save R151 (9%) Ships in 10 - 15 working days

This volume, the 35th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five fully-revised selected regular papers focusing on data quality, social-data artifacts, data privacy, predictive models, and e-health. Specifically, the five papers present and discuss a data-quality framework for the Estonian public sector; a data-driven approach to bridging the gap between the business and social worlds; privacy-preserving querying on privately encrypted data in the cloud; algorithms for the prediction of norovirus concentration in drinking water; and cloud computing in healthcare organizations in Saudi Arabia.

Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017,... Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Pooya Farshim, Emil Simion
R1,460 R1,353 Discovery Miles 13 530 Save R107 (7%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.

CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (Paperback, 5th edition): Mark... CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (Paperback, 5th edition)
Mark Ciampa
R944 R811 Discovery Miles 8 110 Save R133 (14%) Ships in 15 - 25 working days

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional certification and career success. The text covers the essentials of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and cryptography. The extensively updated Fifth Edition features a new structure based on major domains, a new chapter dedicated to mobile device security, expanded coverage of attacks and defenses, and new and updated information reflecting recent developments and emerging trends in information security, such as virtualization. New hands-on and case activities help readers review and apply what they have learned, and end-of-chapter exercises direct readers to the Information Security Community Site for additional activities and a wealth of learning resources, including blogs, videos, and current news and information relevant to the information security field.

Digital Privacy and Security Using Windows - A Practical Guide (Paperback, 1st ed.): Nihad A. Hassan, Rami Hijazi Digital Privacy and Security Using Windows - A Practical Guide (Paperback, 1st ed.)
Nihad A. Hassan, Rami Hijazi
R1,259 R988 Discovery Miles 9 880 Save R271 (22%) Ships in 10 - 15 working days

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You'll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students

The Mobile Application Hacker's Handbook (Paperback): Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse The Mobile Application Hacker's Handbook (Paperback)
Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse 1
R1,270 R1,171 Discovery Miles 11 710 Save R99 (8%) Ships in 10 - 15 working days

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. * Understand the ways data can be stored, and how cryptography is defeated * Set up an environment for identifying insecurities and the data leakages that arise * Develop extensions to bypass security controls and perform injection attacks * Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Aspect-Oriented Security Hardening of UML Design Models (Hardcover, 2015 ed.): Djedjiga Mouheb, Mourad Debbabi, Makan... Aspect-Oriented Security Hardening of UML Design Models (Hardcover, 2015 ed.)
Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, …
R3,113 R2,012 Discovery Miles 20 120 Save R1,101 (35%) Ships in 10 - 15 working days

This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies. Chapters 2 and 3 provide an overview of UML language and the main concepts of aspect-oriented modeling (AOM) respectively. Chapter 4 explores the area of model-driven architecture with a focus on model transformations. The main approaches that are adopted in the literature for security specification and hardening are presented in chapter 5. After these more general presentations, chapter 6 introduces the AOM profile for security aspects specification. Afterwards, chapter 7 details the design and the implementation of the security weaving framework, including several real-life case studies to illustrate its applicability. Chapter 8 elaborates an operational semantics for the matching/weaving processes in activity diagrams, while chapters 9 and 10 present a denotational semantics for aspect matching and weaving in executable models following a continuation-passing style. Finally, a summary and evaluation of the work presented are provided in chapter 11. The book will benefit researchers in academia and industry as well as students interested in learning about recent research advances in the field of software security engineering.

Official (ISC)2 Guide to the CSSLP CBK (Hardcover, 2nd New edition): Mano Paul Official (ISC)2 Guide to the CSSLP CBK (Hardcover, 2nd New edition)
Mano Paul
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequences-data breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in software development and the new security threats they create. Recognized as one of the best application security tools available for professionals involved in software development, the Official (ISC)2 (R) Guide to the CSSLP (R) CBK (R), Second Edition, is both up-to-date and relevant, reflecting the latest developments in this ever-changing field and providing an intuitive approach to the CSSLP Common Body of Knowledge (CBK). It provides a robust and comprehensive study of the 8 domains of the CBK, covering everything from ensuring software security requirements are included in the software design phase to programming concepts that can effectively protect software from vulnerabilities to addressing issues pertaining to proper testing of software for security, and implementing industry standards and practices to provide a high level of assurance that the supply chain is secure-both up-stream. The book discusses the issues facing software professionals today, such as mobile app development, developing in the cloud, software supply chain risk management, and more. Numerous illustrated examples and practical exercises are included in this book to help the reader understand the concepts within the CBK and to enable them to apply these concepts in real-life situations. Endorsed by (ISC)2 and written and reviewed by CSSLPs and other (ISC)2 members, this book serves as an unrivaled study tool for the certification exam and an invaluable career reference. Earning your CSSLP is an esteemed achievement that validates your efforts in security leadership to help your organization build resilient software capable of combating the security threats of today and tomorrow.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,565 Discovery Miles 15 650
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,353 Discovery Miles 13 530
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Dark Mirror - Edward Snowden and the…
Barton Gellman Hardcover R615 R490 Discovery Miles 4 900
Hacking Exposed Computer Forensics
Aaron Philipp Hardcover R1,591 R1,206 Discovery Miles 12 060
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,061 Discovery Miles 10 610
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Blue Team Field Manual (BTFM)
Ben Clark, Alan J White Paperback R298 Discovery Miles 2 980

 

Partners