0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,508)
  • R250 - R500 (664)
  • R500+ (4,503)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

The Basics of Digital Forensics - The Primer for Getting Started in Digital Forensics (Paperback, 2nd edition): John Sammons The Basics of Digital Forensics - The Primer for Getting Started in Digital Forensics (Paperback, 2nd edition)
John Sammons
R670 R505 Discovery Miles 5 050 Save R165 (25%) Ships in 10 - 15 working days

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides you with completely up-to-date real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. You'll also learn how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness. The Second Edition also features expanded resources and references, including online resources that keep you current, sample legal documents, and suggested further reading.

Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015,... Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Rainer Boehme, Tatsuaki Okamoto
R2,564 R2,150 Discovery Miles 21 500 Save R414 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.

Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings... Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings (Paperback, 2015 ed.)
Robin Doss, Selwyn Piramuthu, Wei Zhou
R1,718 R1,345 Discovery Miles 13 450 Save R373 (22%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Future Network Systems and Security, FNSS 2015, held in Paris, France, in June 2015. The 13 full papers presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, communications, systems and security aspects of relevance to the network of the future.

IoT Security - Advances in Authentication (Hardcover): Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila IoT Security - Advances in Authentication (Hardcover)
Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila
R2,512 Discovery Miles 25 120 Ships in 7 - 11 working days

An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book: Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

Cyber-Risk Informatics - Engineering Evaluation with Data Science (Hardcover): Mehmet Sahinoglu Cyber-Risk Informatics - Engineering Evaluation with Data Science (Hardcover)
Mehmet Sahinoglu
R3,051 R2,338 Discovery Miles 23 380 Save R713 (23%) Ships in 10 - 15 working days

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book s specifically preserved website will enable readers to utilize the course related problems. Enables the reader to use the book's website's applications to implement and see results, and use them making budgetary sense Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University s metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

Host Identity Protocol (HIP) - Towards the Secure Mobile Internet (Hardcover): Andrei Gurtov Host Identity Protocol (HIP) - Towards the Secure Mobile Internet (Hardcover)
Andrei Gurtov
R2,029 R1,832 Discovery Miles 18 320 Save R197 (10%) Ships in 10 - 15 working days

"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, "Internet Area Director, IETF"

One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications.

"Unique features of the book: " All-in-one source for HIP specifications Complete coverage of HIP architecture and protocols Base exchange, mobility and multihoming extensions Practical snapshots of protocol operation IP security on lightweight devices Traversal of middleboxes, such as NATs and firewalls Name resolution infrastructure Micromobility, multicast, privacy extensions Chapter on applications, including HIP pilot deployment in a Boeing factory HOWTO for HIP on Linux (HIPL) implementation

An important compliment to the official IETF specifications, this book will be a valuablereference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.

Practical Security (Paperback): Roman Zabicki Practical Security (Paperback)
Roman Zabicki
R631 R385 Discovery Miles 3 850 Save R246 (39%) Ships in 10 - 15 working days

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have a solid foundation if you bring in a dedicated security staff later. Identify the weaknesses in your system, and defend against the attacks most likely to compromise your organization, without needing to become a trained security professional. Computer security is a complex issue. But you don't have to be an expert in all the esoteric details to prevent many common attacks. Attackers are opportunistic and won't use a complex attack when a simple one will do. You can get a lot of benefit without too much complexity, by putting systems and processes in place that ensure you aren't making the obvious mistakes. Secure your systems better, with simple (though not always easy) practices. Plan to patch often to improve your security posture. Identify the most common software vulnerabilities, so you can avoid them when writing software. Discover cryptography - how it works, how easy it is to get wrong, and how to get it right. Configure your Windows computers securely. Defend your organization against phishing attacks with training and technical defenses. Make simple changes to harden your system against attackers. What You Need: You don't need any particular software to follow along with this book. Examples in the book describe security vulnerabilities and how to look for them. These examples will be more interesting if you have access to a code base you've worked on. Similarly, some examples describe network vulnerabilities and how to detect them. These will be more interesting with access to a network you support.

Symbiotic Interaction - 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18-19, 2017, Revised... Symbiotic Interaction - 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18-19, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Jaap Ham, Anna Spagnolli, Benjamin Blankertz, Luciano Gamberini, Giulio Jacucci
R1,127 R1,036 Discovery Miles 10 360 Save R91 (8%) Ships in 10 - 15 working days

This book constitutes the proceedings of the 6th International Workshop on Symbiotic Interaction, Symbiotic 2017, held in Eindhoven, The Netherlands in December 2017. The 8 full papers, 2 short papers and 1 report presented in this volume were carefully reviewed and selected from 23 submissions. The International Workshop on Symbiotic Interaction is the primary venue for presenting scientific work dealing with the symbiotic relationships between humans and computers and for discussing the nature and implications of such relationships.

Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014,... Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Shiyong Zhang, Ke Xu, Mingwei Xu, Jie Wu, Chengrong Wu, …
R1,518 R1,037 Discovery Miles 10 370 Save R481 (32%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third CCF Internet Conference of China, ICoC 2014, held in Shanghai, China, in July 2014. The 10 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers address issues such as software defined network, network security, future Internet architecture, Internet application, network management, network protocols and models, wireless and sensor networks.

Advances in Multimedia Information Processing - PCM 2017 - 18th Pacific-Rim Conference on Multimedia, Harbin, China, September... Advances in Multimedia Information Processing - PCM 2017 - 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Bing Zeng, Qingming Huang, Abdulmotaleb El Saddik, Hongliang Li, Shuqiang Jiang, …
R3,168 R2,535 Discovery Miles 25 350 Save R633 (20%) Ships in 10 - 15 working days

The two-volume set LNCS 10735 and 10736 constitutes the thoroughly refereed proceedings of the 18th Pacific-Rim Conference on Multimedia, PCM 2017, held in Harbin, China, in September 2017. The 184 full papers presented were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections on: Best Paper Candidate; Video Coding; Image Super-resolution, Debluring, and Dehazing; Person Identity and Emotion; Tracking and Action Recognition; Detection and Classification; Multimedia Signal Reconstruction and Recovery; Text and Line Detection/Recognition; Social Media; 3D and Panoramic Vision; Deep Learning for Signal Processing and Understanding; Large-Scale Multimedia Affective Computing; Sensor-enhanced Multimedia Systems; Content Analysis; Coding, Compression, Transmission, and Processing.

Wireshark 101 - Essential Skills for Network Analysis (Paperback, 2nd ed.): Laura Chappell Wireshark 101 - Essential Skills for Network Analysis (Paperback, 2nd ed.)
Laura Chappell; Foreword by Gerald Combs
R1,231 Discovery Miles 12 310 Ships in 7 - 11 working days
Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on... Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Paperback, 2015 ed.)
Riccardo Focardi, Andrew Myers
R2,232 R1,513 Discovery Miles 15 130 Save R719 (32%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015. The 17 regular papers presented in this volume were carefully reviewed and selected from 57 submissions. In addition, one invited talk is included. The papers have been organized in topical sections on information flow and security types, risk assessment and security policies, protocols, hardware and physical security and privacy and voting.

Developing Security Tools of WSN and WBAN Networks Applications (Hardcover, 2015 ed.): Mohsen A. M. El-Bendary Developing Security Tools of WSN and WBAN Networks Applications (Hardcover, 2015 ed.)
Mohsen A. M. El-Bendary
R3,311 R2,995 Discovery Miles 29 950 Save R316 (10%) Ships in 10 - 15 working days

This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.

Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings... Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings (Paperback, 2014 ed.)
Atul Prakash, Rudrapatna Shyamasundar
R2,111 R1,960 Discovery Miles 19 600 Save R151 (7%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.

Cybersecurity - A Self-Teaching Introduction (Paperback): C.P. Gupta, K K Goyal Cybersecurity - A Self-Teaching Introduction (Paperback)
C.P. Gupta, K K Goyal
R827 R639 Discovery Miles 6 390 Save R188 (23%) Ships in 7 - 11 working days

This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, self-teaching format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, Cyberlaw, and more. Features: Provides an overview of cybersecurity and cybercrime subjects in an easy to understand, self-teachingformat Includes discussion of information systems, cryptography, data and network security, threats and viruses, electronic payment systems, malicioussoftware, firewalls and VPNs, security architecture and design, security policies, cyberlaw, and more

Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August... Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings (Paperback, 2014 ed.)
Maki Yoshida, Koichi Mouri
R1,294 R1,218 Discovery Miles 12 180 Save R76 (6%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.

Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014.... Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings (Paperback, 2014 ed.)
Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin
R2,310 R1,917 Discovery Miles 19 170 Save R393 (17%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on security and privacy in networked systems; authentication and access control systems; encryption and cryptography; system and network security; work-in-progress.

Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.):... Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.)
Ghazi Ben Ayed
R3,499 R2,718 Discovery Miles 27 180 Save R781 (22%) Ships in 10 - 15 working days

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author's vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.

Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29,... Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers (Paperback, 2014 ed.)
Aurelien Francillon, Pankaj Rohatgi
R1,279 R1,202 Discovery Miles 12 020 Save R77 (6%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013. The 17 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on security technologies; attacks on masking; side channel attacks; software and protocol analysis; side channel countermeasures; and side channel and fault attacks.

Python Testing with Selenium - Learn to Implement Different Testing Techniques Using the Selenium WebDriver (Paperback, 1st... Python Testing with Selenium - Learn to Implement Different Testing Techniques Using the Selenium WebDriver (Paperback, 1st ed.)
Sujay Raghavendra
R746 R579 Discovery Miles 5 790 Save R167 (22%) Ships in 7 - 11 working days

Implement different testing techniques using Selenium WebDriver with the Python programming language. This quick reference provides simple functional test cases with a syntax-based approach for Selenium WebDriver. You'll begin by reviewing the basics of Selenium WebDriver and its architectural design history and then move on to the configuration and installation of Selenium library for different web browsers, including the basic commands needed to start test scripts in various browsers. You'll review action commands of keyboard and mouse for testing user interactions in a web page and see how hyperlinks are tested. The book also examines various web elements using eight different locators provided by Selenium to help you choose the one best suited to your needs. All Python scripts are ready to test real examples, all of which are explained thoroughly with problem statements. You'll use different Python design patterns to automate test scripts that can be incorporated with Selenium. In the end, Python Testing with Selenium will provide you with the expertise to write your own test cases in future. What You'll Learn Install and configure Selenium WebDriver with Python for different web-browsers Review basic commands of Selenium Locate web elements Work with UI based web elements Assert web elements and handle exceptions Write test scripts in Page Object Model Write test cases with Unittest framework Who This Book Is For Python developers/testers who want to test their web applications

Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.): David Jaramillo, Borko Furht, Ankur Agarwal Virtualization Techniques for Mobile Systems (Hardcover, 2014 ed.)
David Jaramillo, Borko Furht, Ankur Agarwal
R1,875 R1,693 Discovery Miles 16 930 Save R182 (10%) Ships in 10 - 15 working days

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017): Tevfik Bultan, Muath Alkhalaf, Fang Yu,... String Analysis for Software Verification and Security (Hardcover, 1st ed. 2017)
Tevfik Bultan, Muath Alkhalaf, Fang Yu, Abdulbaki Aydin
R1,703 Discovery Miles 17 030 Ships in 10 - 15 working days

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.

Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May... Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings (Paperback, 2014 ed.)
David Pointcheval, Damien Vergnaud
R2,545 R2,165 Discovery Miles 21 650 Save R380 (15%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africa crypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols and Lattice-based Cryptography.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXV (Paperback, 1st ed. 2017): Abdelkader Hameurlain, Josef... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXV (Paperback, 1st ed. 2017)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Sherif Sakr, Imran Razzak, …
R1,760 R1,609 Discovery Miles 16 090 Save R151 (9%) Ships in 10 - 15 working days

This volume, the 35th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains five fully-revised selected regular papers focusing on data quality, social-data artifacts, data privacy, predictive models, and e-health. Specifically, the five papers present and discuss a data-quality framework for the Estonian public sector; a data-driven approach to bridging the gap between the business and social worlds; privacy-preserving querying on privately encrypted data in the cloud; algorithms for the prediction of norovirus concentration in drinking water; and cloud computing in healthcare organizations in Saudi Arabia.

Incident Response & Computer Forensics, Third Edition (Paperback, 3rd edition): Jason Luttgens, Matthew Pepe, Kevin Mandia Incident Response & Computer Forensics, Third Edition (Paperback, 3rd edition)
Jason Luttgens, Matthew Pepe, Kevin Mandia
R1,506 R867 Discovery Miles 8 670 Save R639 (42%) Ships in 10 - 15 working days

"The all-new edition of this security bestseller covers the latest techniques, tools, and case scenarios to help incident responders react quickly and efficiently to data breaches."

"Incident Response and Computer Forensics, Third Edition" is a fully updated edition of the bestselling technical guide that arms you with the right know-how to get your organization out of trouble when data breaches occur.

This new edition is chock-full of updates about tools and techniques as well as new real-world scenarios reflecting today's most common types of incidents. Detailed advice covers all aspects of incident investigation and handling, with an emphasis on forensics--knowing where and how to look into computers for evidence of wrongdoing. New chapters on investigation techniques, indicators of compromise, and remediation New advice on architecting networks from the ground-up to fight intrusions and on streamlining intrusion diagnoses for faster recovery Substantial updates on investigating Windows systems, malware analysis, memory analysis, application analysis, data collection, report writing, and incident management The most relevant tips and tricks for a forensics-forward approach to handling and protecting sensitive data without compromising systems further New and updated information for managers and business leaders to prepare for and manage an incident

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network Attacks and Exploitation - A…
Matthew Monte Paperback R893 R832 Discovery Miles 8 320
Intelligence-Driven Incident Response
Scott Roberts, Rebekah Brown Paperback R1,386 R799 Discovery Miles 7 990
Online Security for the Older Generation
Jim Gatenby Paperback R267 R175 Discovery Miles 1 750
The Web Application Hacker's Handbook…
Dafydd Stuttard, Marcus Pinto Paperback R1,164 R704 Discovery Miles 7 040
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
Hacking Exposed Computer Forensics
Aaron Philipp Hardcover R1,591 R1,206 Discovery Miles 12 060
Cognitive Superiority - Information to…
Dean S. Hartley III, Kenneth O Jobson Hardcover R1,819 Discovery Miles 18 190
Advanced Penetration Testing - Hacking…
Wil Allsopp Paperback R1,097 R648 Discovery Miles 6 480
Adversarial Machine Learning
Anthony D. Joseph, Blaine Nelson, … Hardcover R1,870 R1,577 Discovery Miles 15 770

 

Partners