0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,978)
  • R250 - R500 (801)
  • R500+ (4,712)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Primer on Client-Side Web Security (Paperback, 2014 ed.): Philippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns Primer on Client-Side Web Security (Paperback, 2014 ed.)
Philippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns
R1,250 R1,143 Discovery Miles 11 430 Save R107 (9%) Ships in 10 - 15 working days

This volume illustrates the continuous arms race between attackers and defenders of the Web ecosystem by discussing a wide variety of attacks. In the first part of the book, the foundation of the Web ecosystem is briefly recapped and discussed. Based on this model, the assets of the Web ecosystem are identified, and the set of capabilities an attacker may have are enumerated. In the second part, an overview of the web security vulnerability landscape is constructed. Included are selections of the most representative attack techniques reported in great detail. In addition to descriptions of the most common mitigation techniques, this primer also surveys the research and standardization activities related to each of the attack techniques, and gives insights into the prevalence of those very attacks. Moreover, the book provides practitioners a set of best practices to gradually improve the security of their web-enabled services. Primer on Client-Side Web Security expresses insights into the future of web application security. It points out the challenges of securing the Web platform, opportunities for future research, and trends toward improving Web security.

Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings... Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings (Paperback, 2014 ed.)
Liqun Chen, Chris Mitchell
R1,263 R1,186 Discovery Miles 11 860 Save R77 (6%) Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.

ISSE 2014 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference... ISSE 2014 Securing Electronic Business Processes - Highlights of the Information Security Solutions Europe 2014 Conference (Paperback, 2014 ed.)
Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider
R1,784 R1,563 Discovery Miles 15 630 Save R221 (12%) Ships in 10 - 15 working days

This book presents the most interesting talks given at ISSE 2014 - the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014.

Properly Colored Connectivity of Graphs (Paperback, 1st ed. 2018): Xueliang Li, Colton Magnant, Zhongmei Qin Properly Colored Connectivity of Graphs (Paperback, 1st ed. 2018)
Xueliang Li, Colton Magnant, Zhongmei Qin
R1,401 R1,252 Discovery Miles 12 520 Save R149 (11%) Ships in 10 - 15 working days

A comprehensive survey of proper connection of graphs is discussed in this book with real world applications in computer science and network security. Beginning with a brief introduction, comprising relevant definitions and preliminary results, this book moves on to consider a variety of properties of graphs that imply bounds on the proper connection number. Detailed proofs of significant advancements toward open problems and conjectures are presented with complete references. Researchers and graduate students with an interest in graph connectivity and colorings will find this book useful as it builds upon fundamental definitions towards modern innovations, strategies, and techniques. The detailed presentation lends to use as an introduction to proper connection of graphs for new and advanced researchers, a solid book for a graduate level topics course, or as a reference for those interested in expanding and further developing research in the area.

Secrets and Lies - Digital Security in a Networked World (Hardcover, 15th Anniversary Edition): Bruce Schneier Secrets and Lies - Digital Security in a Networked World (Hardcover, 15th Anniversary Edition)
Bruce Schneier
R709 R440 Discovery Miles 4 400 Save R269 (38%) Ships in 10 - 15 working days

This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively...a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.

On the Move to Meaningful Internet Systems: OTM 2014 Conferences - Confederated International Conferences: CoopIS and ODBASE... On the Move to Meaningful Internet Systems: OTM 2014 Conferences - Confederated International Conferences: CoopIS and ODBASE 2014, Amantea, Italy, October 27-31, 2014. Proceedings (Paperback, 2014 ed.)
Robert Meersman, Herve Panetto, Tharam Dillon, Michele Missikoff, Lin Liu, …
R2,556 R2,299 Discovery Miles 22 990 Save R257 (10%) Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2014, and Ontologies, Databases, and Applications of Semantics, ODBASE 2014, held as part of OTM 2014 in October 2014 in Amantea, Italy. The 39 full papers presented together with 12 short papers and 5 keynotes were carefully reviewed and selected from a total of 115 submissions. The OTM program covers subjects as follows: process designing and modeling, process enactment, monitoring and quality assessment, managing similarity, software services, improving alignment, collaboration systems and applications, ontology querying methodologies and paradigms, ontology support for web, XML, and RDF data processing and retrieval, knowledge bases querying and retrieval, social network and collaborative methodologies, ontology-assisted event and stream processing, ontology-assisted warehousing approaches, ontology-based data representation, and management in emerging domains.

10 Don'ts on Your Digital Devices - The Non-Techie's Survival Guide to Cyber Security and Privacy (Paperback, 1st... 10 Don'ts on Your Digital Devices - The Non-Techie's Survival Guide to Cyber Security and Privacy (Paperback, 1st ed.)
Eric Rzeszut, Daniel Bachrach
R922 R683 Discovery Miles 6 830 Save R239 (26%) Ships in 10 - 15 working days

In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps. It's a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don'ts can't do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble. 10 Don'ts employs personal anecdotes and major news stories to illustrate what can-and all too often does-happen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Don'ts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don't. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don'ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you don't get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physical-in short, so that you don't trust anyone over...anything. Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.

Cybersecurity in Switzerland (Paperback, 2014 ed.): Myriam Dunn Cavelty Cybersecurity in Switzerland (Paperback, 2014 ed.)
Myriam Dunn Cavelty
R1,335 R1,228 Discovery Miles 12 280 Save R107 (8%) Ships in 10 - 15 working days

Gives the reader a detailed account of how cyber-security in Switzerland has evolved over the years, using official documents and a considerable amount of inside knowledge. It focuses on key ideas, institutional arrangements, on the publication of strategy papers, and importantly, on processes leading up to these strategy documents. The peculiarities of the Swiss political system, which influence the way cyber-security can be designed and practiced in Switzerland are considered, as well as the bigger, global influences and driving factors that shaped the Swiss approach to cyber-security. It shows that throughout the years, the most important influence on the Swiss policy-approach was the international level, or rather the developments of a cyber-security policy in other states. Even though many of the basic ideas about information-sharing and public-private partnerships were influenced by (amongst others) the US approach to critical infrastructure protection, the peculiarities of the Swiss political system has led to a particular "Swiss solution", which is based on the federalist structures and subsidiary principles, characterized by stability and resilience to external shocks in the form of cyber-incidents. Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers. It contains not only specific material on an interesting case, but also a wealth of background information on different variations of cyber-security, as well as on information-sharing and public-private partnerships.

Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings... Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings (Paperback, 2014 ed.)
Sjouke Mauw, Christian Damsgaard Jensen
R1,845 R1,140 Discovery Miles 11 400 Save R705 (38%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

Cryptographic Hardware and Embedded Systems -- CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26,... Cryptographic Hardware and Embedded Systems -- CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings (Paperback, 2014 ed.)
Lejla Batina, Matthew Robshaw
R2,607 R2,410 Discovery Miles 24 100 Save R197 (8%) Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.

Applied Computation and Security Systems - Volume One (Paperback, 2015 ed.): Rituparna Chaki, Khalid Saeed, Sankhayan... Applied Computation and Security Systems - Volume One (Paperback, 2015 ed.)
Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki
R2,249 R2,022 Discovery Miles 20 220 Save R227 (10%) Ships in 10 - 15 working days

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different sections. Section-A is on Pattern Recognition and it presents four chapters. Section B is on Imaging and Healthcare Applications contains four more book chapters. The section C of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Sections presenting a total of eleven chapters in it. Section D consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Section E in Volume II is on Cryptography with two book chapters in it. Section F of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

Applied Computation and Security Systems - Volume Two (Paperback, 2015 ed.): Rituparna Chaki, Khalid Saeed, Sankhayan... Applied Computation and Security Systems - Volume Two (Paperback, 2015 ed.)
Rituparna Chaki, Khalid Saeed, Sankhayan Choudhury, Nabendu Chaki
R2,249 R2,022 Discovery Miles 20 220 Save R227 (10%) Ships in 10 - 15 working days

This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India.

The Volume I of this double-volume book contains fourteen high quality book chapters in three different sections. Section-A is on "Pattern Recognition" and it presents four chapters. Section B is on "Imaging and Healthcare Applications" contains four more book chapters. The section C of this volume is on "Wireless Sensor Networking" and it includes as many as six chapters.

Volume II of the book has three Sections presenting a total of eleven chapters in it. Section D consists of five excellent chapters on "Software Engineering "ranging from cloud service design to transactional memory. Section E in Volume II is on "Cryptography" with two book chapters in it. Section F of this volume is on "Computer Aided Design" with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.

Smart Grid Security - Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected... Smart Grid Security - Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Jorge Cuellar
R1,598 R1,015 Discovery Miles 10 150 Save R583 (36%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Smart Grid Security, SmartGridSec 2014, held in Munich, Germany, in February 2014. The volume contains twelve corrected and extended papers presented at the workshop which have undergone two rounds of reviewing and improvement. The engineering, deployment and operation of the future Smart Grid will be an enormous project that will require the active participation of many stakeholders with different interests and views regarding the security and privacy goals, technologies, and solutions. There is an increasing need for workshops that bring together researchers from different communities, from academia and industry, to discuss open research topics in the area of future Smart Grid security.

E-Business and Telecommunications - International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised... E-Business and Telecommunications - International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers (Paperback, 2014 ed.)
Mohammad S. Obaidat, Joaquim Filipe
R2,058 R1,672 Discovery Miles 16 720 Save R386 (19%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Joint Conference on E-Business and Telecommunications, ICETE 2012, held in Rome, Italy, in July 2012. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 18 full papers presented were carefully reviewed and selected from 403 submissions. They cover a wide range of topics in the key areas of e-business and telecommunications.

Guide to Disaster-Resilient Communication Networks (Hardcover, 1st ed. 2020): Jacek Rak, David Hutchison Guide to Disaster-Resilient Communication Networks (Hardcover, 1st ed. 2020)
Jacek Rak, David Hutchison
R2,619 Discovery Miles 26 190 Ships in 7 - 11 working days

This authoritative volume presents a comprehensive guide to the evaluation and design of networked systems with improved disaster resilience. The text offers enlightening perspectives on issues relating to all major failure scenarios, including natural disasters, disruptions caused by adverse weather conditions, massive technology-related failures, and malicious human activities. Topics and features: describes methods and models for the analysis and evaluation of disaster-resilient communication networks; examines techniques for the design and enhancement of disaster-resilient systems; provides a range of schemes and algorithms for resilient systems; reviews various advanced topics relating to resilient communication systems; presents insights from an international selection of more than 100 expert researchers working across the academic, industrial, and governmental sectors. This practically-focused monograph, providing invaluable support on topics of resilient networking equipment and software, is an essential reference for network professionals including network and networked systems operators, networking equipment vendors, providers of essential services, and regulators. The work can also serve as a supplementary textbook for graduate and PhD courses on networked systems resilience.

Attribution of Advanced Persistent Threats - How to Identify the Actors Behind Cyber-Espionage (Hardcover, 2020 ed.): Timo... Attribution of Advanced Persistent Threats - How to Identify the Actors Behind Cyber-Espionage (Hardcover, 2020 ed.)
Timo Steffens
R2,129 Discovery Miles 21 290 Ships in 7 - 11 working days

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension. Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014,... Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings (Paperback, 2014 ed.)
Thorsten Holz, Sotiris Ioannidis
R1,236 R1,159 Discovery Miles 11 590 Save R77 (6%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.

Guide to Network Security (Paperback, New edition): David Mackey, Herbert Mattord, Michael Whitman Guide to Network Security (Paperback, New edition)
David Mackey, Herbert Mattord, Michael Whitman
R895 R766 Discovery Miles 7 660 Save R129 (14%) Ships in 15 - 25 working days

GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastructure, wireless security, and web commerce. The final section covers additional topics relevant for information security practitioners, such as assessing network security, professional careers in the field, and contingency planning. Perfect for both aspiring and active IT professionals, GUIDE TO NETWORK SECURITY is an ideal resource for readers who want to help organizations protect critical information assets and secure their systems and networks, both by recognizing current threats and vulnerabilities, and by designing and developing the secure systems of the future.

Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP... Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings (Paperback, 2014 ed.)
David Naccache, Damien Sauveron
R1,587 R1,465 Discovery Miles 14 650 Save R122 (8%) Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.): Maritta Heisel, Wouter... Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.)
Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli
R2,261 R2,079 Discovery Miles 20 790 Save R182 (8%) Ships in 10 - 15 working days

This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.

Network Hardening - An Automated Approach to Improving Network Security (Paperback, 2014 ed.): Lingyu Wang, Massimiliano... Network Hardening - An Automated Approach to Improving Network Security (Paperback, 2014 ed.)
Lingyu Wang, Massimiliano Albanese, Sushil Jajodia
R1,315 R1,209 Discovery Miles 12 090 Save R106 (8%) Ships in 10 - 15 working days

This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions comprised of initially satisfied conditions, thereby making the solution more enforceable. Following a discussion of the complexity issues in this technique, the authors provide an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs. Also included are automated solutions for hardening a network against sophisticated multi-step intrusions. Network Hardening: An Automated Approach to Improving Network Security is a valuable resource for researchers and professionals working in network security. It is also a useful tool for advanced-level students focused on security in computer science and electrical engineering.

Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum,... Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings (Paperback, 2014 ed.)
Gregorio Martinez Perez, Sabu M. Thampi, Ryan Ko, Lei Shu
R2,436 R2,255 Discovery Miles 22 550 Save R181 (7%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).

Learning Coredns - Configuring DNS for Cloud Native Environments (Paperback): John Belamaric, Cricket Liu Learning Coredns - Configuring DNS for Cloud Native Environments (Paperback)
John Belamaric, Cricket Liu
R1,375 R788 Discovery Miles 7 880 Save R587 (43%) Ships in 10 - 15 working days

Until recently, learning CoreDNS required reading the code or combing through the skimpy documentation on the website. No longer. With this practical book, developers and operators working with Docker or Linux containers will learn how to use this standard DNS server with Kubernetes. John Belamaric, senior staff software engineer at Google, and Cricket Liu, chief DNS architect at Infoblox, show you how to configure CoreDNS using real-world configuration examples to achieve specific purposes. You'll learn the basics of DNS, including how it functions as a location broker in container environments and how it ties into Kubernetes. Dive into DNS theory: the DNS namespace, domain names, domains, and zones Learn how to configure your CoreDNS server Manage and serve basic and advanced zone data with CoreDNS Configure CoreDNS service discovery with etcd and Kubernetes Learn one of the most common use cases for CoreDNS: the integration with Kubernetes Manipulate queries and responses as they flow through the plug-in chain Monitor and troubleshoot the availability and performance of your DNS service Build custom versions of CoreDNS and write your own plug-ins

Secure System Design and Trustable Computing (Hardcover, 1st ed. 2016): Chip-Hong Chang, Miodrag Potkonjak Secure System Design and Trustable Computing (Hardcover, 1st ed. 2016)
Chip-Hong Chang, Miodrag Potkonjak
R3,815 Discovery Miles 38 150 Ships in 7 - 11 working days

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes issues related to security and trust in a variety of electronic devices and systems related to the security of hardware, firmware and software, spanning system applications, online transactions and networking services. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of and trust in, modern society's microelectronic-supported infrastructures.

Biometrics: A Very Short Introduction (Paperback): Michael Fairhurst Biometrics: A Very Short Introduction (Paperback)
Michael Fairhurst
R206 R165 Discovery Miles 1 650 Save R41 (20%) Ships in 10 - 15 working days

We live in a society which is increasingly interconnected, in which communication between individuals is mostly mediated via some electronic platform, and transactions are often carried out remotely. In such a world, traditional notions of trust and confidence in the identity of those with whom we are interacting, taken for granted in the past, can be much less reliable. Biometrics - the scientific discipline of identifying individuals by means of the measurement of unique personal attributes - provides a reliable means of establishing or confirming an individual's identity. These attributes include facial appearance, fingerprints, iris patterning, the voice, the way we write, or even the way we walk. The new technologies of biometrics have a wide range of practical applications, from securing mobile phones and laptops to establishing identity in bank transactions, travel documents, and national identity cards. This Very Short Introduction considers the capabilities of biometrics-based identity checking, from first principles to the practicalities of using different types of identification data. Michael Fairhurst looks at the basic techniques in use today, ongoing developments in system design, and emerging technologies, all aimed at improving precision in identification, and providing solutions to an increasingly wide range of practical problems. Considering how they may continue to develop in the future, Fairhurst explores the benefits and limitations of these pervasive and powerful technologies, and how they can effectively support our increasingly interconnected society. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,061 Discovery Miles 10 610
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Blue Team Field Manual (BTFM)
Ben Clark, Alan J White Paperback R298 Discovery Miles 2 980
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,565 Discovery Miles 15 650
Adversarial Machine Learning
Anthony D. Joseph, Blaine Nelson, … Hardcover R1,870 R1,577 Discovery Miles 15 770
Password Book - Logbook to keep track of…
Imaginary Planet Publishing Paperback R156 Discovery Miles 1 560

 

Partners