0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,505)
  • R250 - R500 (664)
  • R500+ (4,502)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Linguistic Identity Matching (Paperback, 2013 ed.): Bertrand Lisbach, Victoria Meyer Linguistic Identity Matching (Paperback, 2013 ed.)
Bertrand Lisbach, Victoria Meyer
R1,390 R1,269 Discovery Miles 12 690 Save R121 (9%) Ships in 10 - 15 working days

Regulation, risk awareness and technological advances are more and more drawing identity search requirements into business, security and data management processes. Following years of struggling with computational techniques, the new linguistic identity matching approach finally offers an appropriate way for such processes to balance the risk of missing a personal match with the costs of overmatching. The new paradigm for identity searches focuses on understanding the influences that languages, writing systems and cultural conventions have on person names.
A must-read for anyone involved in the purchase, design or study of identity matching systems, this book describes how linguistic and onomastic knowledge can be used to create a more reliable and precise identity search.

A Technical Guide to IPSec Virtual Private Networks (Paperback): James S. Tiller A Technical Guide to IPSec Virtual Private Networks (Paperback)
James S. Tiller
R2,314 Discovery Miles 23 140 Ships in 10 - 15 working days

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become.
A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security.
Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies.
After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

CCNA Security Study Guide - Exam 210-260 (Paperback): Troy McMillan CCNA Security Study Guide - Exam 210-260 (Paperback)
Troy McMillan
R975 R650 Discovery Miles 6 500 Save R325 (33%) Ships in 10 - 15 working days

Cisco has announced big changes to its certification program. As of February 24, 2020, all current certifications will be retired, and Cisco will begin offering new certification programs. The good news is if you're working toward any current CCNA certification, keep going. You have until February 24, 2020 to complete your current CCNA. If you already have CCENT/ICND1 certification and would like to earn CCNA, you have until February 23, 2020 to complete your CCNA certification in the current program. Likewise, if you're thinking of completing the current CCENT/ICND1, ICND2, or CCNA Routing and Switching certification, you can still complete them between now and February 23, 2020. Lay the foundation for a successful career in network security CCNA Security Study Guide offers comprehensive review for Exam 210-260. Packed with concise explanations of core security concepts, this book is designed to help you successfully prepare for the exam. Expert instruction guides you through critical concepts relating to secure network infrastructure, access management, VPN encryption, Firewalls, intrusion prevention and more, with complete coverage of the CCNA exam objectives. Practical examples allow you to apply your skills in real-world scenarios, helping you transition effectively from "learning" to "doing". You also get access to the Sybex online learning environment, featuring the tools you need to maximize your study time: key terminology and flash cards allow you to study anytime, anywhere, while chapter tests and practice exams help you track your progress and gauge your readiness along the way. The CCNA Security certification tests your knowledge of secure network installation, monitoring, and troubleshooting using Cisco security hardware and software solutions. When you're ready to get serious about preparing for the exam, this book gives you the advantage of complete coverage, real-world application, and extensive learning aids to help you pass with confidence. Master Cisco security essentials, standards, and core technologies Work through practical examples drawn from real-world examples Track your progress with online study aids and self-tests Develop critical competencies in maintaining data integrity, confidentiality, and availability Earning your CCNA Security certification validates your abilities in areas that define careers including network security, administrator, and network security support engineer. With data threats continuing to mount, the demand for this skill set will only continue to grow--and in an employer's eyes, a CCNA certification makes you a true professional. CCNA Security Study Guide is the ideal preparation resource for candidates looking to not only pass the exam, but also succeed in the field.

Asset Attack Vectors - Building Effective Vulnerability Management Strategies to Protect Organizations (Paperback, 1st ed.):... Asset Attack Vectors - Building Effective Vulnerability Management Strategies to Protect Organizations (Paperback, 1st ed.)
Morey J. Haber, Brad Hibbert
R660 R509 Discovery Miles 5 090 Save R151 (23%) Ships in 10 - 15 working days

Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN-savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls Who This Book Is For New and intermediate security management professionals, auditors, and information technology staff looking to build an effective vulnerability management program and defend against asset based cyberattacks

Security Metrics, A Beginner's Guide (Paperback, Ed): Caroline Wong Security Metrics, A Beginner's Guide (Paperback, Ed)
Caroline Wong
R857 R668 Discovery Miles 6 680 Save R189 (22%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Security Smarts for the Self-Guided IT Professional"An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it. A must-have for any quality security program!" -Dave Cullinane, CISSP, CISO & VP, Global Fraud, Risk & Security, eBay Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of your organization. Security Metrics: A Beginner's Guide explains, step by step, how to develop and implement a successful security metrics program. This practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, and resourcing. You'll also get details on cloud-based security metrics and process improvement. Templates, checklists, and examples give you the hands-on help you need to get started right away. Security Metrics: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work Caroline Wong, CISSP, was formerly the Chief of Staff for the Global Information Security Team at eBay, where she built the security metrics program from the ground up. She has been a featured speaker at RSA, ITWeb Summit, Metricon, the Executive Women's Forum, ISC2, and the Information Security Forum.

Biometrics: A Very Short Introduction (Paperback): Michael Fairhurst Biometrics: A Very Short Introduction (Paperback)
Michael Fairhurst
R206 R165 Discovery Miles 1 650 Save R41 (20%) Ships in 10 - 15 working days

We live in a society which is increasingly interconnected, in which communication between individuals is mostly mediated via some electronic platform, and transactions are often carried out remotely. In such a world, traditional notions of trust and confidence in the identity of those with whom we are interacting, taken for granted in the past, can be much less reliable. Biometrics - the scientific discipline of identifying individuals by means of the measurement of unique personal attributes - provides a reliable means of establishing or confirming an individual's identity. These attributes include facial appearance, fingerprints, iris patterning, the voice, the way we write, or even the way we walk. The new technologies of biometrics have a wide range of practical applications, from securing mobile phones and laptops to establishing identity in bank transactions, travel documents, and national identity cards. This Very Short Introduction considers the capabilities of biometrics-based identity checking, from first principles to the practicalities of using different types of identification data. Michael Fairhurst looks at the basic techniques in use today, ongoing developments in system design, and emerging technologies, all aimed at improving precision in identification, and providing solutions to an increasingly wide range of practical problems. Considering how they may continue to develop in the future, Fairhurst explores the benefits and limitations of these pervasive and powerful technologies, and how they can effectively support our increasingly interconnected society. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable.

Abusing the Internet of Things (Paperback): Nitesh Dhanjani Abusing the Internet of Things (Paperback)
Nitesh Dhanjani
R1,024 R680 Discovery Miles 6 800 Save R344 (34%) Ships in 10 - 15 working days

A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics. Analyze the design, architecture, and security issues of wireless lighting systems Understand how to breach electronic door locks and their wireless mechanisms Examine security design flaws in remote-controlled baby monitors Evaluate the security design of a suite of IoT-connected home products Scrutinize security vulnerabilities in smart TVs Explore research into security weaknesses in smart cars Delve into prototyping techniques that address security in initial designs Learn plausible attacks scenarios based on how people will likely use IoT devices

Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework (Paperback): Jessey Bullock, Jeff T Parker Wireshark for Security Professionals - Using Wireshark and the Metasploit Framework (Paperback)
Jessey Bullock, Jeff T Parker
R1,234 R715 Discovery Miles 7 150 Save R519 (42%) Ships in 10 - 15 working days

Master Wireshark to solve real-world security problems If you don t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: * Master the basics of Wireshark * Explore the virtual w4sp-lab environment that mimics a real-world network * Gain experience using the Debian-based Kali OS among other systems * Understand the technical details behind network attacks * Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark * Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.

Conquer the Web - The Ultimate Cybersecurity Guide (Paperback): Jonathan Reuvid Conquer the Web - The Ultimate Cybersecurity Guide (Paperback)
Jonathan Reuvid; Nick Wilding, Tim Mitchell, Maureen Kendal, Nick Ioannou
R383 R298 Discovery Miles 2 980 Save R85 (22%) Ships in 10 - 15 working days

This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it? 'A must read for anyone looking to upskill their cyber awareness,' Steve Durbin, Managing Director, Information Security Forum Tons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet or phone. How often do you make payments online? Do you have children and want to ensure they stay safe online? How often do you sit at a coffee shop and log onto their free WIFI? How often do you use social media on the train or bus? If you believe using an antivirus software will keep devices safe... you are wrong. This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks.This Guide covers areas such as: Building resilience into our IT Lifestyle Online Identity Cyber Abuse: Scenarios and Stories Protecting Devices Download and share Gaming, gamble and travel Copycat websites I Spy and QR Codes Banking, apps and Passwords Includes chapers from Nick Wilding, General Manager at AXELOS, Tim Mitchell, Content Director at Get Safe Online, Maureen Kendal, Director at Cybercare, Nick Ioannou, Founder of Boolean Logical, and CYBERAWARE. 'Conquer the Web is a full and comprehensive read for anyone wanting to know more about cyber-security. It takes it time to explain the many acronyms and jargon that are associated with our industry, and goes into detail where necessary.' Sarah Jane MD of Layer8 Ltd 'Online fraud, cyber bullying, identity theft and these are the unfortunate by products of the cyber age. The challenge is how do we protect ourselves in the online world? Conquer the Web provides practical guidance in an easy to understand language that allows readers to take a small number of steps that will greatly increase their online security. A must read for anyone looking to upskill their cyber awareness.' Steve Durbin MD of Information Security Forum Limited

IBM Mainframe Security - Beyond the Basics -- A Practical Guide from a z/OS & RACF Perspective (Paperback): Dinesh D. Dattani IBM Mainframe Security - Beyond the Basics -- A Practical Guide from a z/OS & RACF Perspective (Paperback)
Dinesh D. Dattani
R1,167 R883 Discovery Miles 8 830 Save R284 (24%) Ships in 7 - 11 working days

Rather than rehashing basic information -- such as command syntax -- already available in other publications, this book focuses on important security and audit issues, business best practices, and compliance, discussing the important issues in IBM mainframe security. Mainframes are the backbone of most large IT organisations; security cannot be left to chance. With very little training available to the younger crowd, and older, more experienced personnel retiring or close to retiring, there is a need in mainframe security skills at the senior level. Based on real-life experiences, issues, and solutions to mainframe security from the author's three decades of practical experience as a mainframe security practitioner, this book fulfils that need.

Intelligent Information Processing X - 11th IFIP TC 12 International Conference, IIP 2020, Hangzhou, China, July 3-6, 2020,... Intelligent Information Processing X - 11th IFIP TC 12 International Conference, IIP 2020, Hangzhou, China, July 3-6, 2020, Proceedings (Hardcover, 1st ed. 2020)
Zhongzhi Shi, Sunil Vadera, Elizabeth Chang
R2,548 Discovery Miles 25 480 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the 11th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2020, held in Hangzhou, China, in July 2020. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. They are organized in topical sections on machine learning; multi-agent system; recommendation system; social computing; brain computer integration; pattern recognition; and computer vision and image understanding.

Hackers and Hacking - A Reference Handbook (Hardcover, New): Thomas J. Holt, Bernadette H Schell Hackers and Hacking - A Reference Handbook (Hardcover, New)
Thomas J. Holt, Bernadette H Schell
R1,549 Discovery Miles 15 490 Ships in 7 - 11 working days

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives

CISSP Study Guide (Paperback, 3rd edition): Eric Conrad, Seth Misenar, Joshua Feldman CISSP Study Guide (Paperback, 3rd edition)
Eric Conrad, Seth Misenar, Joshua Feldman
R1,332 R1,120 Discovery Miles 11 200 Save R212 (16%) Ships in 10 - 15 working days

CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more joining their ranks, this new third edition presents everything a reader needs to know on the newest version of the exam's Common Body of Knowledge. The eight domains are covered completely and as concisely as possible, allowing users to ace the exam. Each domain has its own chapter that includes a specially-designed pedagogy to help users pass the exam, including clearly-stated exam objectives, unique terms and definitions, exam warnings, "learning by example" modules, hands-on exercises, and chapter ending questions.

Click Here To Kill Everybody - Security And Survival In A Hyper-connected World (Hardcover): Bruce Schneier Click Here To Kill Everybody - Security And Survival In A Hyper-connected World (Hardcover)
Bruce Schneier
R605 R493 Discovery Miles 4 930 Save R112 (19%) Ships in 10 - 15 working days

A best-selling author and renowned security expert reveals the rise and risks of a new goliath: our massively networked, world-sized web.

We have created the ultimate hive-mind robot: an Internet of interconnected devices that senses, thinks and acts. Bruce Schneier calls it the “World-Sized Web”. It includes everything from driverless cars to smart thermostats, from billboards that respond to specific people to drones equipped with their own behavioural algorithms. While the World-Sized Web carries enormous potential, Schneier argues that we are unprepared for the vulnerabilities it brings. Cutting-edge digital attackers can now crash your car, pacemaker and home security system and everyone else’s.

Click Here to Kill Everybody explores the risks and security implications of the World-Sized Web and lays out common-sense policies that will allow us to enjoy the benefits of this new omnipotent age without surrendering ourselves entirely to our creation.

Cyber-Physical Systems Security (Hardcover, 2018 ed.): Cetin Kaya Koc Cyber-Physical Systems Security (Hardcover, 2018 ed.)
Cetin Kaya Koc
R3,261 R2,697 Discovery Miles 26 970 Save R564 (17%) Ships in 10 - 15 working days

The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.

Advanced Computing and Systems for Security - Volume Eight (Paperback, 1st ed. 2019): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Eight (Paperback, 1st ed. 2019)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R2,247 R1,801 Discovery Miles 18 010 Save R446 (20%) Ships in 10 - 15 working days

The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) held in Kolkata, India on February 9-11, 2018. The symposium was organized by the University of Calcutta's Department of Computer Science & Engineering and A. K. Choudhury School of Information Technology, and the International partners were Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. Reflect the symposium's sessions, the book discusses topics such as biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.

Embedded Multimedia Security Systems - Algorithms and Architectures (Hardcover, 2013 ed.): Amit Pande, Joseph Zambreno Embedded Multimedia Security Systems - Algorithms and Architectures (Hardcover, 2013 ed.)
Amit Pande, Joseph Zambreno
R2,995 R2,398 Discovery Miles 23 980 Save R597 (20%) Ships in 10 - 15 working days

Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.

Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed): Christopher Elisan Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed)
Christopher Elisan
R850 R662 Discovery Miles 6 620 Save R188 (22%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away. Malware, Rootkits & Botnets: A Beginner's Guidefeatures: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at work

Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas
R2,375 Discovery Miles 23 750 Ships in 7 - 11 working days

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

Internet Password Book - Organizer with Alphabetical Tabs for Easy Password Keeping (Paperback): Westport Publishing Internet Password Book - Organizer with Alphabetical Tabs for Easy Password Keeping (Paperback)
Westport Publishing
R125 Discovery Miles 1 250 Ships in 7 - 11 working days
Reverse Deception: Organized Cyber Threat Counter-Exploitation (Paperback, Ed): Sean Bodmer, Max Kilger, Gregory Carpenter,... Reverse Deception: Organized Cyber Threat Counter-Exploitation (Paperback, Ed)
Sean Bodmer, Max Kilger, Gregory Carpenter, Jade Jones
R861 R673 Discovery Miles 6 730 Save R188 (22%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert authors provide full coverage of legal and ethical issues, operational vetting, and security team management. Establish the goals and scope of your reverse deception campaign Identify, analyze, and block APTs Engage and catch nefarious individuals and their organizations Assemble cyber-profiles, incident analyses, and intelligence reports Uncover, eliminate, and autopsy crimeware, trojans, and botnets Work with intrusion detection, anti-virus, and digital forensics tools Employ stealth honeynet, honeypot, and sandbox technologies Communicate and collaborate with legal teams and law enforcement

The Computer Incident Response Planning Handbook:  Executable Plans for Protecting Information at Risk (Paperback, Ed): N. K.... The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk (Paperback, Ed)
N. K. McCarthy, Matthew Todd, Jeff Klaben
R1,170 R887 Discovery Miles 8 870 Save R283 (24%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Uncertainty and risk, meet planning and action. Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis. Contains the essentials for developing both data breach and malware outbreak response plans-and best practices for maintaining those plans Features ready-to-implement CIRPs-derived from living incident response plans that have survived the rigors of repeated execution and numerous audits Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties-and how to protect shareholder value Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24

Container Security - Fundamental Technology Concepts that Protect Containerized Applications (Paperback): Liz Rice Container Security - Fundamental Technology Concepts that Protect Containerized Applications (Paperback)
Liz Rice
R977 R747 Discovery Miles 7 470 Save R230 (24%) Ships in 7 - 11 working days

To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions. Author Liz Rice, VP of open source engineering at Aqua Security, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you're ready to get started. Explore attack vectors that affect container deployments Dive into the Linux constructs that underpin containers Examine measures for hardening containers Understand how misconfigurations can compromise container isolation Learn best practices for building container images Identify container images that have known software vulnerabilities Leverage secure connections between containers Use security tooling to prevent attacks on your deployment

Principles of Information Security, International Edition (Paperback, 4th edition): Michael Whitman, Herbert Mattord Principles of Information Security, International Edition (Paperback, 4th edition)
Michael Whitman, Herbert Mattord
R931 R797 Discovery Miles 7 970 Save R134 (14%) Ships in 15 - 25 working days

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Readers will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important economic consequences for which management will be held accountable. Readers can feel confident that they are using a standards-based, content-driven resource to prepare for their work in the field.

Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018): Tongtong Li, Tianlong Song,... Wireless Communications under Hostile Jamming: Security and Efficiency (Hardcover, 1st ed. 2018)
Tongtong Li, Tianlong Song, Yuan Liang
R2,756 R2,469 Discovery Miles 24 690 Save R287 (10%) Ships in 10 - 15 working days

This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
70 Tips and Tricks for Mastering the…
R. Sarma Danturthi Paperback R813 R636 Discovery Miles 6 360
Blue Team Field Manual (BTFM)
Ben Clark, Alan J White Paperback R298 Discovery Miles 2 980
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,061 Discovery Miles 10 610
Adversarial Machine Learning
Anthony D. Joseph, Blaine Nelson, … Hardcover R1,870 R1,577 Discovery Miles 15 770
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,353 Discovery Miles 13 530
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Intelligence-Driven Incident Response
Scott Roberts, Rebekah Brown Paperback R1,386 R799 Discovery Miles 7 990
RTFM - Red Team Field Manual
Ben Clark Paperback R197 Discovery Miles 1 970
The Web Application Hacker's Handbook…
Dafydd Stuttard, Marcus Pinto Paperback R1,164 R704 Discovery Miles 7 040
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R123 Discovery Miles 1 230

 

Partners