0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,977)
  • R250 - R500 (801)
  • R500+ (4,715)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

An Introduction to Cyber Modeling and Simulation (Hardcover): Jerry M. Couretas An Introduction to Cyber Modeling and Simulation (Hardcover)
Jerry M. Couretas
R2,382 R2,140 Discovery Miles 21 400 Save R242 (10%) Ships in 10 - 15 working days

Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments, the author presents the overall information assurance process, incorporating the people, policies, processes, and technologies currently available in the field. The author ties up the various threads that currently compose cyber M&S into a coherent view of what is measurable, simulative, and usable in order to evaluate systems for assured operation. An Introduction to Cyber Modeling and Simulation provides the reader with examples of tools and technologies currently available for performing cyber modeling and simulation. It examines how decision-making processes may benefit from M&S in cyber defense. It also examines example emulators, simulators and their potential combination. The book also takes a look at corresponding verification and validation (V&V) processes, which provide the operational community with confidence in knowing that cyber models represent the real world. This book: Explores the role of cyber M&S in decision making Provides a method for contextualizing and understanding cyber risk Shows how concepts such the Risk Management Framework (RMF) leverage multiple processes and policies into a coherent whole Evaluates standards for pure IT operations, "cyber for cyber," and operational/mission cyber evaluations--"cyber for others" Develops a method for estimating both the vulnerability of the system (i.e., time to exploit) and provides an approach for mitigating risk via policy, training, and technology alternatives Uses a model-based approach An Introduction to Cyber Modeling and Simulation is a must read for all technical professionals and students wishing to expand their knowledge of cyber M&S for future professional work.

Understanding Cryptography - A Textbook for Students and Practitioners (Hardcover, 1st ed. 2010): Bart Preneel Understanding Cryptography - A Textbook for Students and Practitioners (Hardcover, 1st ed. 2010)
Bart Preneel; Christof Paar, Jan Pelzl
R839 R787 Discovery Miles 7 870 Save R52 (6%) Ships in 10 - 15 working days

Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.

After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.

The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers."

Network Security and Cryptography (Paperback): Sarhan M. Musa Network Security and Cryptography (Paperback)
Sarhan M. Musa
R1,243 Discovery Miles 12 430 Ships in 10 - 15 working days

Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions

Cyberpower and National Security (Paperback, New): Larry Wentz, Stuart H. Starr, Franklin D. Kramer Cyberpower and National Security (Paperback, New)
Larry Wentz, Stuart H. Starr, Franklin D. Kramer
R679 R508 Discovery Miles 5 080 Save R171 (25%) Ships in 10 - 15 working days

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. "Cyberpower and National Security" assembles a group of experts and discusses pertinent issues in five areas.The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization."Cyberpower and National Security" frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges. With more than two dozen contributors, "Cyberpower and National Security" covers it all.

Trust Management XI - 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017,... Trust Management XI - 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings (Hardcover, 1st ed. 2017)
Jan-Philipp Steghoefer, Babak Esfandiari
R2,253 R1,959 Discovery Miles 19 590 Save R294 (13%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2017, held in Gothenburg, Sweden, in June 2017. The 8 revised full papers and 6 short papers presented were carefully reviewed and selected from 29 submissions. The papers are organized in the following topical sections: information sharing and personal data; novel sources of trust and trust information; applications of trust; trust metrics; and reputation systems. Also included is the 2017 William Winsborough commemorative address and three short IFIPTM 2017 graduate symposium presentations.

Information Security Management Handbook, Volume 3 (Hardcover, 6th New edition): Harold F. Tipton, Micki Krause Information Security Management Handbook, Volume 3 (Hardcover, 6th New edition)
Harold F. Tipton, Micki Krause
R3,372 Discovery Miles 33 720 Ships in 10 - 15 working days

Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology field, the Information Security Management Handbook, updated yearly, has become the standard on which all IT security programs and certifications are based. It reflects new updates to the Common Body of Knowledge (CBK) that IT security professionals all over the globe need to know.

Captures the crucial elements of the CBK

Exploring the ten domains of the CBK, the book explores access control, telecommunications and network security, information security and risk management, application security, and cryptography. In addition, the expert contributors address security architecture and design, operations security, business continuity planning and disaster recovery planning. The book also covers legal regulations, compliance, investigation, and physical security. In this anthology of treatises dealing with the management and technical facets of information security, the contributors examine varied topics such as anywhere computing, virtualization, podslurping, quantum computing, mashups, blue snarfing, mobile device theft, social computing, voting machine insecurity, and format string vulnerabilities.

Also available on CD-ROM

Safeguarding information continues to be a crucial concern of all IT professionals. As new risks threaten the security of our systems, it is imperative that those charged with protecting that information continually update their armor of knowledge to guard against tomorrow's hackers and software vulnerabilities. This comprehensive Handbook, also available in fully searchable CD-ROM format keeps IT professionals abreast of new developments on the security horizon and reinforces timeless concepts, providing them with the best information, guidance, and counsel they can obtain.

Financial Cybersecurity Risk Management - Leadership Perspectives and Guidance for Systems and Institutions (Paperback, 1st... Financial Cybersecurity Risk Management - Leadership Perspectives and Guidance for Systems and Institutions (Paperback, 1st ed.)
Paul Rohmeyer, Jennifer L. Bayuk
R845 R588 Discovery Miles 5 880 Save R257 (30%) Ships in 10 - 15 working days

Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of cyber challenges and choosing between risk treatment options. Financial cybersecurity is a complex, systemic risk challenge that includes technological and operational elements. The interconnectedness of financial systems and markets creates dynamic, high-risk environments where organizational security is greatly impacted by the level of security effectiveness of partners, counterparties, and other external organizations. The result is a high-risk environment with a growing need for cooperation between enterprises that are otherwise direct competitors. There is a new normal of continuous attack pressures that produce unprecedented enterprise threats that must be met with an array of countermeasures. Financial Cybersecurity Risk Management explores a range of cybersecurity topics impacting financial enterprises. This includes the threat and vulnerability landscape confronting the financial sector, risk assessment practices and methodologies, and cybersecurity data analytics. Governance perspectives, including executive and board considerations, are analyzed as are the appropriate control measures and executive risk reporting. What You'll Learn Analyze the threat and vulnerability landscape confronting the financial sector Implement effective technology risk assessment practices and methodologies Craft strategies to treat observed risks in financial systems Improve the effectiveness of enterprise cybersecurity capabilities Evaluate critical aspects of cybersecurity governance, including executive and board oversight Identify significant cybersecurity operational challenges Consider the impact of the cybersecurity mission across the enterprise Leverage cybersecurity regulatory and industry standards to help manage financial services risks Use cybersecurity scenarios to measure systemic risks in financial systems environments Apply key experiences from actual cybersecurity events to develop more robust cybersecurity architectures Who This Book Is For Decision makers, cyber leaders, and front-line professionals, including: chief risk officers, operational risk officers, chief information security officers, chief security officers, chief information officers, enterprise risk managers, cybersecurity operations directors, technology and cybersecurity risk analysts, cybersecurity architects and engineers, and compliance officers

Shield Your Privacy - 15 Ways To Protect Your Personal Information (Hardcover): Heather Nickerson Shield Your Privacy - 15 Ways To Protect Your Personal Information (Hardcover)
Heather Nickerson
R397 Discovery Miles 3 970 Ships in 7 - 11 working days
Practical Security Properties on Commodity Computing Platforms - The uber eXtensible Micro-Hypervisor Framework (Paperback, 1st... Practical Security Properties on Commodity Computing Platforms - The uber eXtensible Micro-Hypervisor Framework (Paperback, 1st ed. 2019)
Amit Vasudevan
R1,125 R1,033 Discovery Miles 10 330 Save R92 (8%) Ships in 10 - 15 working days

This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence. uberXMHF, in addition, facilitates runtime monitoring of the untrustworthy components, which is illustrated in this SpringerBrief. uberXMHF focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows) and unfettered access to platform hardware; (b) low trusted computing base and complexity; and (c) efficient implementation. uberXMHF strives to be a comprehensible, practical and flexible platform for performing micro-hypervisor research and development. uberXMHF encapsulates common hypervisor core functionality in a framework that allows developers and users to build custom micro-hypervisor based (security-sensitive) applications (called "uberapps"). The authors describe several uberapps that employ uberXMHF and showcase the framework efficacy and versatility. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path and on-demand I/O isolation. The authors are encouraged by the end result - a clean, barebones, low trusted computing base micro-hypervisor framework for commodity platforms with desirable performance characteristics and an architecture amenable to manual audits and/or formal reasoning. Active, open-source development of uberXMHF continues. The primary audience for this SpringerBrief is system (security) researchers and developers of commodity system software. Practitioners working in system security deployment mechanisms within industry and defense, as well as advanced-level students studying computer science with an interest in security will also want to read this SpringerBrief.

Agile Application Security (Paperback): Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Bird Agile Application Security (Paperback)
Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Bird
R1,398 R812 Discovery Miles 8 120 Save R586 (42%) Ships in 10 - 15 working days

Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. You'll learn how to: Add security practices to each stage of your existing development lifecycle Integrate security with planning, requirements, design, and at the code level Include security testing as part of your team's effort to deliver working software in each release Implement regulatory compliance in an agile or DevOps environment Build an effective security program through a culture of empathy, openness, transparency, and collaboration

Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover): Dobromir Todorov Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover)
Dobromir Todorov
R2,931 Discovery Miles 29 310 Ships in 10 - 15 working days

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.

Advances in Cryptology -- CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015,... Advances in Cryptology -- CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II (Paperback, 1st ed. 2015)
Rosario Gennaro, Matthew Robshaw
R2,623 R1,754 Discovery Miles 17 540 Save R869 (33%) Ships in 10 - 15 working days

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.

Blue Team Field Manual (BTFM) (Paperback): Ben Clark, Alan J White Blue Team Field Manual (BTFM) (Paperback)
Ben Clark, Alan J White
R298 Discovery Miles 2 980 In stock
Advances in Digital Forensics XII - 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected... Advances in Digital Forensics XII - 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Gilbert Peterson, Sujeet Shenoi
R2,328 R1,891 Discovery Miles 18 910 Save R437 (19%) Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics XII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Mobile Device Forensics, Network Forensics, Cloud Forensics, Social Media Forensics, Image Forensics, Forensic Techniques, and Forensic Tools. This book is the twelfth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty edited papers from the Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in New Delhi, India in the winter of 2016. Advances in Digital Forensics XII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

Mastering Ethereum (Paperback): Andreas Antonopoulos, Gavin Wood Mastering Ethereum (Paperback)
Andreas Antonopoulos, Gavin Wood
R1,406 R820 Discovery Miles 8 200 Save R586 (42%) Ships in 10 - 15 working days

Ethereum represents the gateway to a worldwide, decentralized computing paradigm. This platform enables you to run decentralized applications (DApps) and smart contracts that have no central points of failure or control, integrate with a payment network, and operate on an open blockchain. With this practical guide, Andreas M. Antonopoulos and Gavin Wood provide everything you need to know about building smart contracts and DApps on Ethereum and other virtual-machine blockchains. Discover why IBM, Microsoft, NASDAQ, and hundreds of other organizations are experimenting with Ethereum. This essential guide shows you how to develop the skills necessary to be an innovator in this growing and exciting new industry. Run an Ethereum client, create and transmit basic transactions, and program smart contracts Learn the essentials of public key cryptography, hashes, and digital signatures Understand how "wallets" hold digital keys that control funds and smart contracts Interact with Ethereum clients programmatically using JavaScript libraries and Remote Procedure Call interfaces Learn security best practices, design patterns, and anti-patterns with real-world examples Create tokens that represent assets, shares, votes, or access control rights Build decentralized applications using multiple peer-to-peer (P2P) components

Progress in Cryptology -  AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 - 22,... Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 - 22, 2020, Proceedings (Paperback, 1st ed. 2020)
Abderrahmane Nitaj, Amr Youssef
R1,936 Discovery Miles 19 360 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, held in Cairo, Egypt, in July 2020. The 21 papers presented in this book were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on zero knowledge, symmetric key cryptography, elliptic curves, post quantum cryptography, lattice based cryptography, side channel attacks, cryptanalysis and new algorithms and schemes. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).

Security in Sensor Networks (Hardcover): Yang Xiao Security in Sensor Networks (Hardcover)
Yang Xiao
R2,897 Discovery Miles 28 970 Ships in 10 - 15 working days

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks. About the Author Before joining the Department of Computer Science at the University of Alabama in 2006, and his prior position at the University of Memphis in 2002, Dr. Yang Xiao was an accomplished Medium Access Control (MAC) architect deeply involved in IEEE 802.11 standard enhancement. A former voting member of IEEE 802.11 Working Group, he serves as editor or on the editorial boards of numerous prestigious journals that cover emerging topics within mobile and wireless computing. A co-editor of seven books, he also serves as a referee/reviewer for many funding agencies, as well as a panelist for the National Science Foundation.

Confident cyber security - how to get started in cyber security & futureproof your career (Paperback): Jessica Barker, Kogan... Confident cyber security - how to get started in cyber security & futureproof your career (Paperback)
Jessica Barker, Kogan Page 1
R385 R308 Discovery Miles 3 080 Save R77 (20%) Ships in 5 - 10 working days

This jargon-busting guide will give you a clear overview of the world of cyber security. Exploring everything from the human side to the technical and physical implications, this book takes you through the basics: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies from companies such as Facebook, Google and the NHS, as well as fashion, entertainment, property and other industries, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security.

Proceedings of International Conference on Frontiers in Computing and Systems - COMSYS 2020 (Paperback, 1st ed. 2021): Debotosh... Proceedings of International Conference on Frontiers in Computing and Systems - COMSYS 2020 (Paperback, 1st ed. 2021)
Debotosh Bhattacharjee, Dipak Kumar Kole, Nilanjan Dey, Subhadip Basu, Dariusz Plewczynski
R5,228 Discovery Miles 52 280 Ships in 7 - 11 working days

This book gathers outstanding research papers presented at the International Conference on Frontiers in Computing and Systems (COMSYS 2020), held on January 13-15, 2019 at Jalpaiguri Government Engineering College, West Bengal, India and jointly organized by the Department of Computer Science & Engineering and Department of Electronics & Communication Engineering. The book presents the latest research and results in various fields of machine learning, computational intelligence, VLSI, networks and systems, computational biology, and security, making it a rich source of reference material for academia and industry alike.

Building Digital Experience Platforms - A Guide to Developing Next-Generation Enterprise Applications (Paperback, 1st ed.):... Building Digital Experience Platforms - A Guide to Developing Next-Generation Enterprise Applications (Paperback, 1st ed.)
Shailesh Kumar Shivakumar, Sourabhh Sethii
R820 R643 Discovery Miles 6 430 Save R177 (22%) Ships in 7 - 11 working days

Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise platform. In this book the authors examine various features of DXPs and provide rich insights into building each layer in a digital platform. Proven best practices are presented with examples for designing and building layers. A special focus is provided on security and quality attributes needed for business-critical enterprise applications. The authors cover modern and emerging digital trends such as Blockchain, IoT, containers, chatbots, artificial intelligence, and more. The book is divided into five parts related to requirements/design, development, security, infrastructure, and case study. The authors employ proven real-world methods, best practices, and security and integration techniques derived from their rich experience. An elaborate digital transformation case study for a banking application is included. What You'll Learn Develop a digital experience platform from end to end Understand best practices and proven methods for designing overall architecture, user interface and integration components, security, and infrastructure Study real-world cases, including an elaborate digital transformation building an enterprise platform for a banking application Know the open source tools and technology frameworks that can be used to build DXPs Who This Book Is For Web developers, full stack developers, digital enthusiasts, digital project managers, and architects

Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover): Kai Rannenberg, Jan Camenisch, Ahmad... Attribute-based Credentials for Trust - Identity in the Information Society (Hardcover)
Kai Rannenberg, Jan Camenisch, Ahmad Sabouri
R3,209 R2,923 Discovery Miles 29 230 Save R286 (9%) Ships in 10 - 15 working days

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users' privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)

Security in Network Coding (Hardcover, 1st ed. 2016): Peng Zhang, Chuang Lin Security in Network Coding (Hardcover, 1st ed. 2016)
Peng Zhang, Chuang Lin
R2,743 R2,207 Discovery Miles 22 070 Save R536 (20%) Ships in 10 - 15 working days

This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework of network coding. These three mechanisms are MacSig, a new message authentication method for network-coded systems; P-Coding, a new encryption scheme to secure network-coding-based transmissions; and ANOC, a new anonymous routing protocol that seamlessly integrates anonymous routing with network coding. Along with these three mechanisms, the authors provide a review of network coding's benefits, applications, and security problems. Also included is a detailed overview of security issues in the field, with an explanation of how the security issues differ from those in traditional settings. While network coding can help improve network performance, the adoption of network coding can be greatly limited unless security and privacy threats are addressed. Designed for researchers and professionals, Security in Network Coding explores major challenges in network coding and offers practical solutions. Advanced-level students studying networking or system security will also find the content valuable.

Serverless Security - Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google... Serverless Security - Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud (Paperback, 1st ed.)
Miguel A. Calles
R813 R635 Discovery Miles 6 350 Save R178 (22%) Ships in 7 - 11 working days

Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructure. You will come away having security knowledge that enables you to secure a project you are supporting and have technical conversations with cybersecurity personnel. At a time when there are many news stories on cybersecurity breaches, it is crucial to think about security in your applications. It is tempting to believe that having a third-party host the entire computing platform will increase security. This book shows you why cybersecurity is the responsibility of everyone working on the project. What You Will Learn Gain a deeper understanding of cybersecurity in serverless computing Know how to use free and open source tools (such as the Node Package Manager, ESLint, and VSCode) to reduce vulnerabilities in your application code Assess potential threats from event triggers in your serverless functions Understand security best practices in serverless computing Develop an agnostic security architecture while reducing risk from vendor-specific infrastructure Who This Book Is For Developers or security engineers looking to expand their current knowledge of traditional cybersecurity into serverless computing projects. Individuals just beginning in serverless computing and cybersecurity can apply the concepts in this book in their projects.

Combating Security Challenges in the Age of Big Data - Powered by State-of-the-Art Artificial Intelligence Techniques... Combating Security Challenges in the Age of Big Data - Powered by State-of-the-Art Artificial Intelligence Techniques (Hardcover, 1st ed. 2020)
Zubair Md. Fadlullah, Al-Sakib Khan Pathan
R3,363 Discovery Miles 33 630 Ships in 7 - 11 working days

This book addresses the key security challenges in the big data centric computing and network systems, and discusses how to tackle them using a mix of conventional and state-of-the-art techniques. The incentive for joining big data and advanced analytics is no longer in doubt for businesses and ordinary users alike. Technology giants like Google, Microsoft, Amazon, Facebook, Apple, and companies like Uber, Airbnb, NVIDIA, Expedia, and so forth are continuing to explore new ways to collect and analyze big data to provide their customers with interactive services and new experiences. With any discussion of big data, security is not, however, far behind. Large scale data breaches and privacy leaks at governmental and financial institutions, social platforms, power grids, and so forth, are on the rise that cost billions of dollars. The book explains how the security needs and implementations are inherently different at different stages of the big data centric system, namely at the point of big data sensing and collection, delivery over existing networks, and analytics at the data centers. Thus, the book sheds light on how conventional security provisioning techniques like authentication and encryption need to scale well with all the stages of the big data centric system to effectively combat security threats and vulnerabilities. The book also uncovers the state-of-the-art technologies like deep learning and blockchain which can dramatically change the security landscape in the big data era.

Information Systems Security and Privacy - 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25,... Information Systems Security and Privacy - 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Paolo Mori, Steven Furnell, Olivier Camp
R2,343 Discovery Miles 23 430 Ships in 7 - 11 working days

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, held in Prague, Czech Republic, in February 2019. The 19 full papers presented were carefully reviewed and selected from a total of 100 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
Password Book - Logbook to keep track of…
Imaginary Planet Publishing Paperback R156 Discovery Miles 1 560
Cognitive Superiority - Information to…
Dean S. Hartley III, Kenneth O Jobson Hardcover R1,819 Discovery Miles 18 190
Hacking Exposed Computer Forensics
Aaron Philipp Hardcover R1,591 R1,206 Discovery Miles 12 060
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,061 Discovery Miles 10 610
Dark Mirror - Edward Snowden and the…
Barton Gellman Hardcover R615 R490 Discovery Miles 4 900
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Intelligence-Driven Incident Response
Scott Roberts, Rebekah Brown Paperback R1,386 R799 Discovery Miles 7 990

 

Partners