0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,645)
  • R250 - R500 (712)
  • R500+ (5,139)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Securing the Perimeter - Deploying Identity and Access Management with Free Open Source Software (Paperback, 1st ed.): Michael... Securing the Perimeter - Deploying Identity and Access Management with Free Open Source Software (Paperback, 1st ed.)
Michael Schwartz, Maciej Machulak
R1,163 R829 Discovery Miles 8 290 Save R334 (29%) Ships in 10 - 15 working days

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack. The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it's more valuable to prevent than to detect a security breach. That's why Identity and Access Management (IAM) is a critical component of an organization's security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as "suites" because IAM is not just one component. It's a number of components working together, including web, authentication, authorization, cryptographic, and persistence services. Securing the Perimeter documents a recipe to take advantage of open standards to build an enterprise-class IAM service using free open source software. This recipe can be adapted to meet the needs of both small and large organizations. While not a comprehensive guide for every application, this book provides the key concepts and patterns to help administrators and developers leverage a central security infrastructure. Cloud IAM service providers would have you believe that managing an IAM is too hard. Anything unfamiliar is hard, but with the right road map, it can be mastered. You may find SaaS identity solutions too rigid or too expensive. Or perhaps you don't like the idea of a third party holding the credentials of your users-the keys to your kingdom. Open source IAM provides an alternative. Take control of your IAM infrastructure if digital services are key to your organization's success. What You'll Learn Understand why you should deploy a centralized authentication and policy management infrastructure Use the SAML or Open ID Standards for web or single sign-on, and OAuth for API Access Management Synchronize data from existing identity repositories such as Active Directory Deploy two-factor authentication services Who This Book Is For Security architects (CISO, CSO), system engineers/administrators, and software developers

Advanced Computing and Systems for Security - Volume Five (Paperback, 1st ed. 2018): Rituparna Chaki, Agostino Cortesi, Khalid... Advanced Computing and Systems for Security - Volume Five (Paperback, 1st ed. 2018)
Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki
R2,178 R1,981 Discovery Miles 19 810 Save R197 (9%) Ships in 10 - 15 working days

This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland. This bi-volume book has a total of 21 papers divided in 7 chapters. The chapters reflect the sessions in which the works have been discussed during the symposium. The different chapters in the book include works on biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks and security systems.

Hands-On Ethical Hacking and Network Defense (Paperback, 2nd edition): James Corley, Kent Backman, Michael Simpson Hands-On Ethical Hacking and Network Defense (Paperback, 2nd edition)
James Corley, Kent Backman, Michael Simpson
R989 R841 Discovery Miles 8 410 Save R148 (15%) Ships in 15 - 25 working days

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of the federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.

Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MOBISEC 2011,... Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Ramjee Prasad, Karoly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, …
R1,639 R1,259 Discovery Miles 12 590 Save R380 (23%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization.

Introduction to Machine Learning with Applications in Information Security (Hardcover): Mark Stamp Introduction to Machine Learning with Applications in Information Security (Hardcover)
Mark Stamp
R1,401 Discovery Miles 14 010 Ships in 10 - 15 working days

Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn't prove theorems, or otherwise dwell on mathematical theory. The goal is to present topics at an intuitive level, with just enough detail to clarify the underlying concepts. The book covers core machine learning topics in-depth, including Hidden Markov Models, Principal Component Analysis, Support Vector Machines, and Clustering. It also includes coverage of Nearest Neighbors, Neural Networks, Boosting and AdaBoost, Random Forests, Linear Discriminant Analysis, Vector Quantization, Naive Bayes, Regression Analysis, Conditional Random Fields, and Data Analysis. Most of the examples in the book are drawn from the field of information security, with many of the machine learning applications specifically focused on malware. The applications presented are designed to demystify machine learning techniques by providing straightforward scenarios. Many of the exercises in this book require some programming, and basic computing concepts are assumed in a few of the application sections. However, anyone with a modest amount of programming experience should have no trouble with this aspect of the book. Instructor resources, including PowerPoint slides, lecture videos, and other relevant material are provided on an accompanying website: http://www.cs.sjsu.edu/~stamp/ML/. For the reader's benefit, the figures in the book are also available in electronic form, and in color. About the Author Mark Stamp has been a Professor of Computer Science at San Jose State University since 2002. Prior to that, he worked at the National Security Agency (NSA) for seven years, and a Silicon Valley startup company for two years. He received his Ph.D. from Texas Tech University in 1992. His love affair with machine learning began in the early 1990s, when he was working at the NSA, and continues today at SJSU, where he has supervised vast numbers of master's student projects, most of which involve a combination of information security and machine learning.

Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020):... Linking Sensitive Data - Methods and Techniques for Practical Privacy-Preserving Information Sharing (Hardcover, 1st ed. 2020)
Peter Christen, Thilina Ranbaduge, Rainer Schnell
R3,369 Discovery Miles 33 690 Ships in 7 - 11 working days

This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking sensitive information, concepts and algorithms for privacy-preserving record linkage and their computational aspects, practical considerations such as dealing with dirty and missing data, as well as privacy, risk, and performance assessment measures. Existing techniques for privacy-preserving record linkage are evaluated empirically and real-world application examples that scale to population sizes are described. The book also includes pointers to freely available software tools, benchmark data sets, and tools to generate synthetic data that can be used to test and evaluate linkage techniques. This book consists of fourteen chapters grouped into four parts, and two appendices. The first part introduces the reader to the topic of linking sensitive data, the second part covers methods and techniques to link such data, the third part discusses aspects of practical importance, and the fourth part provides an outlook of future challenges and open research problems relevant to linking sensitive databases. The appendices provide pointers and describe freely available, open-source software systems that allow the linkage of sensitive data, and provide further details about the evaluations presented. A companion Web site at https://dmm.anu.edu.au/lsdbook2020 provides additional material and Python programs used in the book. This book is mainly written for applied scientists, researchers, and advanced practitioners in governments, industry, and universities who are concerned with developing, implementing, and deploying systems and tools to share sensitive information in administrative, commercial, or medical databases. The Book describes how linkage methods work and how to evaluate their performance. It covers all the major concepts and methods and also discusses practical matters such as computational efficiency, which are critical if the methods are to be used in practice - and it does all this in a highly accessible way!David J. Hand, Imperial College, London

Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed.... Fundamentals and Applications of Hardcopy Communication - Conveying Side Information by Printed Media (Hardcover, 1st ed. 2018)
Joceli Mayer, Paulo V.K. Borges, Steven J. Simske
R1,841 R1,689 Discovery Miles 16 890 Save R152 (8%) Ships in 10 - 15 working days

This book presents covert, semi-covert and overt techniques for communication over printed media by modifying images, texts or barcodes within the document. Basic and advanced techniques are discussed aimed to modulate information into images, texts and barcodes. Conveying information over printed media can be useful for content authentication, author copyright, information and piracy product deterrent, side information for marketing, among other applications. Practical issues are discussed and experiments are provided to evaluate competitive approaches for hard-copy communication. This book is a useful resource for researchers, practitioners and graduate students in the field of hard-copy communication by providing the fundamentals, basic and advanced techniques as examples of approaches to address the hard-copy media distortions and particularities.

Managing Cybersecurity Risk - Cases Studies and Solutions (Paperback, 2nd edition): Jonathan Reuvid Managing Cybersecurity Risk - Cases Studies and Solutions (Paperback, 2nd edition)
Jonathan Reuvid
R1,023 R746 Discovery Miles 7 460 Save R277 (27%) Ships in 10 - 15 working days

The first edition, published November 2016, was targeted at the directors and senior managers of SMEs and larger organisations that have not yet paid sufficient attention to cybersecurity and possibly did not appreciate the scale or severity of permanent risk to their businesses. The book was an important wake-up call and primer and proved a significant success, including wide global reach and diverse additional use of the chapter content through media outlets. The new edition, targeted at a similar readership, will provide more detailed information about the cybersecurity environment and specific threats. It will offer advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost. A content sharing partnership has been agreed with major technology provider Alien Vault and the 2017 edition will be a larger book of approximately 250 pages.

Compilation for Secure Multi-party Computation (Paperback, 1st ed. 2017): Niklas Buscher, Stefan Katzenbeisser Compilation for Secure Multi-party Computation (Paperback, 1st ed. 2017)
Niklas Buscher, Stefan Katzenbeisser
R1,351 R1,244 Discovery Miles 12 440 Save R107 (8%) Ships in 10 - 15 working days

This book presents a holistic view on compiler assisted practical secure multi-party computation (MPC) over Boolean circuits. It discusses that two or more parties jointly evaluate a function over their inputs in such a way that each party keeps its input unknown to the other parties in MPC. MPC provides a generic way to construct Privacy-Enhancing Technologies, which protect sensitive data during processing steps in untrusted environments. A major obstacle in the past was to generate MPC applications by hand. Recently, special compilers have been developed to build all kinds of applications. This book also explains in detail how efficient MPC applications can be created automatically from ANSI-C, thus, bridging the areas of cryptography, compilation and hardware synthesis. It also gives an insight into the requirements for creating efficient applications for MPC and is hence of interest to not only researchers in the area of MPC but also developers realizing practical applications with MPC. For a better understanding of the complete compile chain from ANSI-C to circuits, which is the 'machine code' of MPC, the authors first give the necessary background information on MPC protocols, Boolean logic, and logic synthesis. Then the authors describe the various compilation steps required to translate any code into an adequate circuit description. Afterwards, the authors introduce a variety of optimization techniques for two classes of MPC protocols, namely techniques that improve the runtime of applications in constant- and multi-round MPC protocols. The authors also illustrate how efficient parallelization of MPC protocols can be achieved using the assistance of compilers. It presents the effectiveness of the proposed techniques by giving a detailed evaluation on benchmarking applications. Most of the aforementioned techniques are implemented in our open source compiler that is accompanying this book and allows to study compilation for MPC in practice.Researchers who are interested in practical secure multi-party computation (MPC), and developers who are interested in realizing MPC applications in practice will find this book useful as a reference, as well as advanced-level students in computer science.

CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001) (Paperback, Ed): Fernando Maymi, Brent... CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-001) (Paperback, Ed)
Fernando Maymi, Brent Chapman
R1,309 R859 Discovery Miles 8 590 Save R450 (34%) Ships in 10 - 15 working days

This comprehensive self-study guide offers complete coverage of the new CompTIA Cybersecurity Analyst+ certification exam This highly effective self-study system provides complete coverage of every objective for the challenging CompTIA CSA+ Cybersecurity Analyst exam. You'll find learning objectives at the beginning of each chapter, exam tips, in-depth explanations, and practice exam questions. All questions closely mirror those on the live test in content, format, and tone. Designed to help you pass exam CS0-001 with ease, this definitive guide also serves as an essential on-the-job reference. Covers every topic on the exam, including: * Threat and vulnerability management * Conducting and analyzing reconnaissance * Responding to network-based threats * Securing a cooperate network * Cyber incident response * Determining the impact of incidents * Preparing the incident response toolkit * Security architectures * Policies, procedures, and controls * Assuring identity and access management * Putting in compensating controls * Secure software development Electronic content includes: * 175+ practice questions * Secured book PDF

Smart Cities of Today and Tomorrow - Better Technology, Infrastructure and Security (Paperback, 1st ed. 2019): Joseph N.... Smart Cities of Today and Tomorrow - Better Technology, Infrastructure and Security (Paperback, 1st ed. 2019)
Joseph N. Pelton, Indu B. Singh
R604 R480 Discovery Miles 4 800 Save R124 (21%) Ships in 7 - 11 working days

Hackers, cyber-criminals, Dark Web users, and techno-terrorists beware! This book should make you think twice about attempting to do your dirty work in the smart cities of tomorrow. Scores of cities around the world have begun planning what are known as "smart cities." These new or revamped urban areas use the latest technology to make the lives of residents easier and more enjoyable.They will have automated infrastructures such as the Internet of Things, "the Cloud," automated industrial controls, electronic money, mobile and communication satellite systems, wireless texting and networking. With all of these benefits come new forms of danger, and so these cities will need many safeguards to prevent cyber criminals from wreaking havoc. This book explains the advantages of smart cities and how to design and operate one. Based on the practical experience of the authors in projects in the U.S. and overseas in Dubai, Malaysia, Brazil and India, it tells how such a city is planned and analyzes vital security concerns that must be addressed along the way. Most of us will eventually live in smart cities. What are the advantages and the latest design strategies for such ventures? What are the potential drawbacks? How will they change the lives of everyday citizens? This book offers a preview of our future and how you can help prepare yourself for the changes to come.

Internet Password Organizer - Never Forget A Password Again! 5" x 8" Pink Flower Watercolor Design, Small Password Organizer... Internet Password Organizer - Never Forget A Password Again! 5" x 8" Pink Flower Watercolor Design, Small Password Organizer With Tabbed Pages, Pocket-Size Over 200 Record User And Password. Keep Favorite Website, Username, Email Used, And Passwords In One (Paperback)
Ellie And Scott
R123 Discovery Miles 1 230 Ships in 7 - 11 working days
Privileged Attack Vectors - Building Effective Cyber-Defense Strategies to Protect Organizations (Paperback, 2nd ed.): Morey J.... Privileged Attack Vectors - Building Effective Cyber-Defense Strategies to Protect Organizations (Paperback, 2nd ed.)
Morey J. Haber
R905 R701 Discovery Miles 7 010 Save R204 (23%) Ships in 7 - 11 working days

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today's environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journey Develop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems

Cybersecurity - The Insights You Need from Harvard Business Review (Paperback): Harvard Business Review, Alex Blau, Andrew... Cybersecurity - The Insights You Need from Harvard Business Review (Paperback)
Harvard Business Review, Alex Blau, Andrew Burt, Boris Groysberg, Roman V. Yampolskiy
R386 R319 Discovery Miles 3 190 Save R67 (17%) Ships in 10 - 15 working days

No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room. Cybersecurity: The Insights You Need from Harvard Business Review brings you today's most essential thinking on cybersecurity, from outlining the challenges to exploring the solutions, and provides you with the critical information you need to prepare your company for the inevitable hack. The lessons in this book will help you get everyone in your organization on the same page when it comes to protecting your most valuable assets. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues--blockchain, cybersecurity, AI, and more--each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas--and prepare you and your company for the future.

Computer Forensics For Dummies (Paperback): Carol Pollard, Reynaldo Anzaldua Computer Forensics For Dummies (Paperback)
Carol Pollard, Reynaldo Anzaldua
R608 R429 Discovery Miles 4 290 Save R179 (29%) Ships in 10 - 15 working days

Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in "Computer Forensics For Dummies" Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.

You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You'll discover how to use the latest forensic software, tools, and equipment to find the answers that you're looking for in record time. When you understand how data is stored, encrypted, and recovered, you'll be able to protect your personal privacy as well. By the time you finish reading this book, you'll know how to: Prepare for and conduct computer forensics investigationsFind and filter dataProtect personal privacyTransfer evidence without contaminating itAnticipate legal loopholes and opponents' methodsHandle passwords and encrypted dataWork with the courts and win the case

Plus, "Computer Forensics for Dummies" includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Integration, Interconnection, and Interoperability of IoT Systems (Hardcover, 1st ed. 2018): Raffaele Gravina, Carlos E. Palau,... Integration, Interconnection, and Interoperability of IoT Systems (Hardcover, 1st ed. 2018)
Raffaele Gravina, Carlos E. Palau, Marco Manso, Antonio Liotta, Giancarlo Fortino
R3,504 R2,693 Discovery Miles 26 930 Save R811 (23%) Ships in 10 - 15 working days

This edited book investigates the lack of interoperability in the IoT realm, including innovative research as well as technical solutions to interoperability, integration, and interconnection of heterogeneous IoT systems, at any level. It also explores issues caused by lack of interoperability such as impossibility to plug non-interoperable IoT devices into heterogeneous IoT platforms, impossibility to develop IoT applications exploiting multiple platforms in homogeneous and/or cross domains, slowness of IoT technology introduction at large-scale: discouragement in adopting IoT technology, increase of costs; scarce reusability of technical solutions and difficulty in meeting user satisfaction.

The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback): Michael Hale Ligh,... The Art of Memory Forensics - Detecting Malware and Threats in Windows, Linux, and Mac Memory (Paperback)
Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters
R1,339 R1,232 Discovery Miles 12 320 Save R107 (8%) Ships in 10 - 15 working days

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: * How volatile memory analysis improves digital investigations * Proper investigative steps for detecting stealth malware and advanced threats * How to use free, open source tools for conducting thorough memory forensics * Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

Listening In - Cybersecurity in an Insecure Age (Paperback): Susan Landau Listening In - Cybersecurity in an Insecure Age (Paperback)
Susan Landau
R380 R304 Discovery Miles 3 040 Save R76 (20%) Ships in 5 - 10 working days

A cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity-and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.

A Comprehensive Guide to 5G Security (Hardcover): Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika... A Comprehensive Guide to 5G Security (Hardcover)
Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
R2,746 R2,463 Discovery Miles 24 630 Save R283 (10%) Ships in 10 - 15 working days

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.

Web Services Security (Paperback, Ed): Mark O'Neill Web Services Security (Paperback, Ed)
Mark O'Neill
R1,149 R876 Discovery Miles 8 760 Save R273 (24%) Ships in 7 - 11 working days

Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You’ll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more.

Disaster Proofing Information Systems (Paperback, Ed): Robert Buchanan Disaster Proofing Information Systems (Paperback, Ed)
Robert Buchanan
R1,236 R1,151 Discovery Miles 11 510 Save R85 (7%) Ships in 7 - 11 working days

Nobody wants to shell out a lot of money for something theyll use once or, with any luck, never. But thats where most corporations find themselves today. Network managers see disaster recovery as outside their jurisdiction, and therefore as a competitor for system resources. External incentives to deploy disaster recovery from customers and partners may be pressing, but internal incentives are working against them.

This book provides a methodology responsive to those problems. With careful planning, it can actually improve system performance instead of encumbering it. Even if your organization isnt budgeted for disaster recovery planning, you can implement this methodology now, at minimum cost, and reap immediate returns. For companies already invested in system protection software, Buchanan shows network managers how to get started on impact and risk assessment, protection planning, policymaking, and more.

Pattern and Security Requirements - Engineering-Based Establishment of Security Standards (Hardcover, 2015 ed.): Kristian... Pattern and Security Requirements - Engineering-Based Establishment of Security Standards (Hardcover, 2015 ed.)
Kristian Beckers
R3,296 R2,650 Discovery Miles 26 500 Save R646 (20%) Ships in 10 - 15 working days

Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns. Understanding Pattern and Security Requirements engineering methods is important for software engineers, security analysts and other professionals that are tasked with establishing a security standard, as well as researchers who aim to investigate the problems with establishing security standards. The examples and explanations in this book are designed to be understandable by all these readers.

Internet Password Logbook (Red Leatherette) - Keep track of usernames, passwords, web addresses in one easy and organized... Internet Password Logbook (Red Leatherette) - Keep track of usernames, passwords, web addresses in one easy and organized location (Hardcover)
Editors of Rock Point
R185 R120 Discovery Miles 1 200 Save R65 (35%) Ships in 10 - 15 working days

Just say "no" to piles of sticky notes and scraps of paper with your passwords and logins! Keep track of them in this elegant, yet inconspicuous, alphabetically tabbed red leatherette notebook. In this 4" x 5.75" hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You'll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.

Wireless Network Security A Beginner's Guide (Paperback, Ed): Tyler Wrightson Wireless Network Security A Beginner's Guide (Paperback, Ed)
Tyler Wrightson
R848 R660 Discovery Miles 6 600 Save R188 (22%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates forauthentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wirelesssolutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away. Wireless Network Security: A Beginner's Guidefeatures: Lingo--Common security terms defined so that you'rein the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience In Actual Practice--Exceptions to the rules of securityexplained in real-world contexts Your Plan--Customizable checklists you can use onthe job now Into Action--Tips on how, why, and when to applynew skills and techniques at work This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)

Securing the Clicks Network Security in the Age of Social Media (Paperback, Ed): Gary Bahadur, Jason Inasi, Alex De Carvalho Securing the Clicks Network Security in the Age of Social Media (Paperback, Ed)
Gary Bahadur, Jason Inasi, Alex De Carvalho
R810 R633 Discovery Miles 6 330 Save R177 (22%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Defend against corporate espionage launched from social networksProtect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume. Assess your global social media presence and identify vulnerabilities Establish solid security policies at every level of your organization Allocate resources for planning, administration, and corrective action Monitor usage by employees, clients, competitors, and the public Block cyberstalking. phishing, malware, and identity theft exploits Guard intellectual property rights, trademarks, copyrights, and logos Preserve your brand image using online reputation management tools Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. He was the cofounder and CIO of Foundstone, Inc. Jason Inasi is CEO and cofounder of The Factory Interactive {www.thefactoryi.com], a digital design and marketing agency, and president of Inasi Group, an international, multidisciplinary, technology advisory firm. Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International, and adjunct professor of social media at the University of Miami.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,061 Discovery Miles 10 610
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R123 Discovery Miles 1 230
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Network Attacks and Exploitation - A…
Matthew Monte Paperback R893 R832 Discovery Miles 8 320
Intelligence-Driven Incident Response
Scott Roberts, Rebekah Brown Paperback R1,386 R799 Discovery Miles 7 990
Information Theoretic Security and…
Holger Boche, H. Vincent Poor Hardcover R2,555 R2,421 Discovery Miles 24 210
The Web Application Hacker's Handbook…
Dafydd Stuttard, Marcus Pinto Paperback R1,164 R704 Discovery Miles 7 040
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,565 Discovery Miles 15 650

 

Partners