0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,649)
  • R250 - R500 (732)
  • R500+ (5,136)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Web Application Security, A Beginner's Guide (Paperback, Ed): Bryan Sullivan, Vincent Liu Web Application Security, A Beginner's Guide (Paperback, Ed)
Bryan Sullivan, Vincent Liu
R846 R658 Discovery Miles 6 580 Save R188 (22%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Security Smarts for the Self-Guided IT Professional"Get to know the hackers-or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." -Ryan McGeehan, Security Manager, Facebook, Inc. Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks. This practical resource includes chapters on authentication, authorization, and session management, along with browser, database, and file security--all supported by true stories from industry. You'll also get best practices for vulnerability detection and secure development, as well as a chapter that covers essential security fundamentals. This book's templates, checklists, and examples are designed to help you get started right away. Web Application Security: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the authors' years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work

Security-Aware Device-to-Device Communications Underlaying Cellular Networks (Paperback, 1st ed. 2016): Aiqing Zhang, Liang... Security-Aware Device-to-Device Communications Underlaying Cellular Networks (Paperback, 1st ed. 2016)
Aiqing Zhang, Liang Zhou, Lei Wang
R1,287 Discovery Miles 12 870 Ships in 10 - 15 working days

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user's throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency. This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.

Digital Forensics Basics - A Practical Guide Using Windows OS (Paperback, 1st ed.): Nihad A. Hassan Digital Forensics Basics - A Practical Guide Using Windows OS (Paperback, 1st ed.)
Nihad A. Hassan
R814 R636 Discovery Miles 6 360 Save R178 (22%) Ships in 7 - 11 working days

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You'll Learn Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques Who This Book Is For Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals

Privileged Attack Vectors - Building Effective Cyber-Defense Strategies to Protect Organizations (Paperback, 2nd ed.): Morey J.... Privileged Attack Vectors - Building Effective Cyber-Defense Strategies to Protect Organizations (Paperback, 2nd ed.)
Morey J. Haber
R905 R701 Discovery Miles 7 010 Save R204 (23%) Ships in 7 - 11 working days

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today's environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journey Develop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems

Deep Learning Applications for Cyber Security (Hardcover, 1st ed. 2019): Mamoun Alazab, MingJian Tang Deep Learning Applications for Cyber Security (Hardcover, 1st ed. 2019)
Mamoun Alazab, MingJian Tang
R3,012 R2,614 Discovery Miles 26 140 Save R398 (13%) Ships in 10 - 15 working days

Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems. Filling an important gap between deep learning and cyber security communities, it discusses topics covering a wide range of modern and practical deep learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security. The book focuses on mature and proven techniques, and provides ample examples to help readers grasp the key points.

Physical Layer Security in Wireless Cooperative Networks (Hardcover, 1st ed. 2018): Li Wang Physical Layer Security in Wireless Cooperative Networks (Hardcover, 1st ed. 2018)
Li Wang
R3,005 R2,854 Discovery Miles 28 540 Save R151 (5%) Ships in 10 - 15 working days

This book provides a comprehensive overview for physical layer security in wireless cooperative networks, including fundamental concepts, typical solutions, and some recent achievements. It investigates the secrecy performance with respect to time reversal transmission and multi-antenna spatial modulation techniques. Both of which are proposed as effective physical layer processing schemes in wireless multipath channel environment. Resource allocation strategies to enhance secrecy performance in D2D communications are also discussed in this book. It contributes to formulating user social behaviors and utilizing social characteristics to improve the secrecy performance in wireless cooperative networks. This book not only analyzes the secrecy enhancement with certain techniques, but also pursues to find the relationships or tradeoffs among the secrecy performance, energy consumption, channel conditions, and other essential factors in wireless communications. This book targets researchers and professionals specializing in electronic engineering, computer science,wireless communications and networks. Advanced level students in electrical engineering and computer science will also find this book useful as a secondary text.

Artificial Intelligence and Machine Learning for Digital Pathology - State-of-the-Art and Future Challenges (Paperback, 1st ed.... Artificial Intelligence and Machine Learning for Digital Pathology - State-of-the-Art and Future Challenges (Paperback, 1st ed. 2020)
Andreas Holzinger, Randy Goebel, Michael Mengel, Heimo Muller
R1,718 Discovery Miles 17 180 Ships in 7 - 11 working days

Data driven Artificial Intelligence (AI) and Machine Learning (ML) in digital pathology, radiology, and dermatology is very promising. In specific cases, for example, Deep Learning (DL), even exceeding human performance. However, in the context of medicine it is important for a human expert to verify the outcome. Consequently, there is a need for transparency and re-traceability of state-of-the-art solutions to make them usable for ethical responsible medical decision support. Moreover, big data is required for training, covering a wide spectrum of a variety of human diseases in different organ systems. These data sets must meet top-quality and regulatory criteria and must be well annotated for ML at patient-, sample-, and image-level. Here biobanks play a central and future role in providing large collections of high-quality, well-annotated samples and data. The main challenges are finding biobanks containing ''fit-for-purpose'' samples, providing quality related meta-data, gaining access to standardized medical data and annotations, and mass scanning of whole slides including efficient data management solutions.

Hadoop Security (Paperback): Ben Spivey, Joey Echeverria Hadoop Security (Paperback)
Ben Spivey, Joey Echeverria
R1,029 R720 Discovery Miles 7 200 Save R309 (30%) Ships in 10 - 15 working days

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach. Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You'll also get real-world examples that demonstrate how you can apply these concepts to your use cases. Understand the challenges of securing distributed systems, particularly Hadoop Use best practices for preparing Hadoop cluster hardware as securely as possible Get an overview of the Kerberos network authentication protocol Delve into authorization and accounting principles as they apply to Hadoop Learn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at rest Integrate Hadoop data ingest into enterprise-wide security architecture Ensure that security architecture reaches all the way to end-user access

Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013,... Policies and Research in Identity Management - Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings (Hardcover, 2013 ed.)
Simone Fischer-Hubner, Elisabeth De Leeuw, Chris J. Mitchell
R1,993 R1,708 Discovery Miles 17 080 Save R285 (14%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third IFIP WG 11.6 Working Conference on Policies and Research in Identity Management, IDMAN 2013, held in London, UK, in April 2013. The 6 refereed full and 4 short papers presented together with 3 short position papers and a keynote paper were selected from 26 submissions. The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, risk management of identity management, identity management with smart cards, and federated identity management.

Investigating the Cyber Breach - The Digital Forensics Guide for the Network Engineer (Paperback): Joseph Muniz, Aamir Lakhani Investigating the Cyber Breach - The Digital Forensics Guide for the Network Engineer (Paperback)
Joseph Muniz, Aamir Lakhani
R968 R439 Discovery Miles 4 390 Save R529 (55%) Ships in 10 - 15 working days

Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer * Understand the realities of cybercrime and today's attacks * Build a digital forensics lab to test tools and methods, and gain expertise * Take the right actions as soon as you discover a breach * Determine the full scope of an investigation and the role you'll play * Properly collect, document, and preserve evidence and data * Collect and analyze data from PCs, Macs, IoT devices, and other endpoints * Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence * Analyze iOS and Android devices, and understand encryption-related obstacles to investigation * Investigate and trace email, and identify fraud or abuse * Use social media to investigate individuals or online identities * Gather, extract, and analyze breach data with Cisco tools and techniques * Walk through common breaches and responses from start to finish * Choose the right tool for each task, and explore alternatives that might also be helpful The professional's go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press (R), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security for Non-Techies (Paperback, 3rd ed.): Carey Parker Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security for Non-Techies (Paperback, 3rd ed.)
Carey Parker
R796 R753 Discovery Miles 7 530 Save R43 (5%) Ships in 10 - 15 working days

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data-just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You'll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don't really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves-step by step, without judgment, and with as little jargon as possible.

Container Security - Fundamental Technology Concepts that Protect Containerized Applications (Paperback): Liz Rice Container Security - Fundamental Technology Concepts that Protect Containerized Applications (Paperback)
Liz Rice
R977 R747 Discovery Miles 7 470 Save R230 (24%) Ships in 7 - 11 working days

To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions. Author Liz Rice, VP of open source engineering at Aqua Security, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you're ready to get started. Explore attack vectors that affect container deployments Dive into the Linux constructs that underpin containers Examine measures for hardening containers Understand how misconfigurations can compromise container isolation Learn best practices for building container images Identify container images that have known software vulnerabilities Leverage secure connections between containers Use security tooling to prevent attacks on your deployment

Multimedia Big Data Computing for IoT Applications - Concepts, Paradigms and Solutions (Hardcover, 1st ed. 2020): Sudeep... Multimedia Big Data Computing for IoT Applications - Concepts, Paradigms and Solutions (Hardcover, 1st ed. 2020)
Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar
R1,951 Discovery Miles 19 510 Ships in 10 - 15 working days

This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (QoS) requirements, presenting case studies to demonstrate its application. Further, the book examines the layered architecture of MMBD computing and compares the life cycle of both big data and MMBD. Written by leading experts, it also includes numerous solved examples, technical descriptions, scenarios, procedures, and algorithms.

Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6,... Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings (Paperback, 1st ed. 2015)
Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, …
R2,151 R1,840 Discovery Miles 18 400 Save R311 (14%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015.... Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings (Paperback, 1st ed. 2015)
Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martinez
R2,138 R1,709 Discovery Miles 17 090 Save R429 (20%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015,... Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Rainer Boehme, Tatsuaki Okamoto
R2,564 R2,237 Discovery Miles 22 370 Save R327 (13%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.

Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings... Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings (Paperback, 2015 ed.)
Robin Doss, Selwyn Piramuthu, Wei Zhou
R1,718 R1,408 Discovery Miles 14 080 Save R310 (18%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Future Network Systems and Security, FNSS 2015, held in Paris, France, in June 2015. The 13 full papers presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, communications, systems and security aspects of relevance to the network of the future.

Cyber-Risk Informatics - Engineering Evaluation with Data Science (Hardcover): Mehmet Sahinoglu Cyber-Risk Informatics - Engineering Evaluation with Data Science (Hardcover)
Mehmet Sahinoglu
R3,051 R2,466 Discovery Miles 24 660 Save R585 (19%) Ships in 10 - 15 working days

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book s specifically preserved website will enable readers to utilize the course related problems. Enables the reader to use the book's website's applications to implement and see results, and use them making budgetary sense Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University s metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

Host Identity Protocol (HIP) - Towards the Secure Mobile Internet (Hardcover): Andrei Gurtov Host Identity Protocol (HIP) - Towards the Secure Mobile Internet (Hardcover)
Andrei Gurtov
R1,932 Discovery Miles 19 320 Ships in 10 - 15 working days

"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, "Internet Area Director, IETF"

One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications.

"Unique features of the book: " All-in-one source for HIP specifications Complete coverage of HIP architecture and protocols Base exchange, mobility and multihoming extensions Practical snapshots of protocol operation IP security on lightweight devices Traversal of middleboxes, such as NATs and firewalls Name resolution infrastructure Micromobility, multicast, privacy extensions Chapter on applications, including HIP pilot deployment in a Boeing factory HOWTO for HIP on Linux (HIPL) implementation

An important compliment to the official IETF specifications, this book will be a valuablereference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.

Symbiotic Interaction - 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18-19, 2017, Revised... Symbiotic Interaction - 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18-19, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Jaap Ham, Anna Spagnolli, Benjamin Blankertz, Luciano Gamberini, Giulio Jacucci
R1,092 Discovery Miles 10 920 Ships in 10 - 15 working days

This book constitutes the proceedings of the 6th International Workshop on Symbiotic Interaction, Symbiotic 2017, held in Eindhoven, The Netherlands in December 2017. The 8 full papers, 2 short papers and 1 report presented in this volume were carefully reviewed and selected from 23 submissions. The International Workshop on Symbiotic Interaction is the primary venue for presenting scientific work dealing with the symbiotic relationships between humans and computers and for discussing the nature and implications of such relationships.

Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014,... Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Shiyong Zhang, Ke Xu, Mingwei Xu, Jie Wu, Chengrong Wu, …
R1,518 R1,093 Discovery Miles 10 930 Save R425 (28%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third CCF Internet Conference of China, ICoC 2014, held in Shanghai, China, in July 2014. The 10 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers address issues such as software defined network, network security, future Internet architecture, Internet application, network management, network protocols and models, wireless and sensor networks.

IoT Security - Advances in Authentication (Hardcover): Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila IoT Security - Advances in Authentication (Hardcover)
Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila
R2,512 Discovery Miles 25 120 Ships in 7 - 11 working days

An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book: Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

Advances in Multimedia Information Processing - PCM 2017 - 18th Pacific-Rim Conference on Multimedia, Harbin, China, September... Advances in Multimedia Information Processing - PCM 2017 - 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Bing Zeng, Qingming Huang, Abdulmotaleb El Saddik, Hongliang Li, Shuqiang Jiang, …
R3,168 R2,671 Discovery Miles 26 710 Save R497 (16%) Ships in 10 - 15 working days

The two-volume set LNCS 10735 and 10736 constitutes the thoroughly refereed proceedings of the 18th Pacific-Rim Conference on Multimedia, PCM 2017, held in Harbin, China, in September 2017. The 184 full papers presented were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections on: Best Paper Candidate; Video Coding; Image Super-resolution, Debluring, and Dehazing; Person Identity and Emotion; Tracking and Action Recognition; Detection and Classification; Multimedia Signal Reconstruction and Recovery; Text and Line Detection/Recognition; Social Media; 3D and Panoramic Vision; Deep Learning for Signal Processing and Understanding; Large-Scale Multimedia Affective Computing; Sensor-enhanced Multimedia Systems; Content Analysis; Coding, Compression, Transmission, and Processing.

Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on... Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Paperback, 2015 ed.)
Riccardo Focardi, Andrew Myers
R2,232 R1,575 Discovery Miles 15 750 Save R657 (29%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015. The 17 regular papers presented in this volume were carefully reviewed and selected from 57 submissions. In addition, one invited talk is included. The papers have been organized in topical sections on information flow and security types, risk assessment and security policies, protocols, hardware and physical security and privacy and voting.

Developing Security Tools of WSN and WBAN Networks Applications (Hardcover, 2015 ed.): Mohsen A. M. El-Bendary Developing Security Tools of WSN and WBAN Networks Applications (Hardcover, 2015 ed.)
Mohsen A. M. El-Bendary
R3,311 R3,144 Discovery Miles 31 440 Save R167 (5%) Ships in 10 - 15 working days

This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cyberpower and National Security
Larry Wentz, Stuart H. Starr, … Paperback R679 R532 Discovery Miles 5 320
Hacking Exposed Computer Forensics
Aaron Philipp Hardcover R1,591 R1,206 Discovery Miles 12 060
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
Data Localization Laws and Policy - The…
W. Kuan Hon Hardcover R3,623 Discovery Miles 36 230
Adversarial Machine Learning
Anthony D. Joseph, Blaine Nelson, … Hardcover R1,651 Discovery Miles 16 510
Handbook on Data Centers
Samee U. Khan, Albert Y. Zomaya Hardcover R6,312 R5,225 Discovery Miles 52 250
Wtf Is My Password - Password Book…
Booki Nova Paperback R115 Discovery Miles 1 150
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,650 Discovery Miles 16 500
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
The Web Application Hacker's Handbook…
Dafydd Stuttard, Marcus Pinto Paperback R1,164 R737 Discovery Miles 7 370

 

Partners