0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,506)
  • R250 - R500 (663)
  • R500+ (4,488)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Computer Safety, Reliability, and Security - SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The... Computer Safety, Reliability, and Security - SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings (Paperback, 1st ed. 2015)
Floor Koornneef, Coen van Gulijk
R2,194 R1,699 Discovery Miles 16 990 Save R495 (23%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2015, the 34th International Conference on Computer Safety, Reliability, and Security, held in Delft, The Netherlands, in September 2015. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. This year's workshop are: ASSURE 2015 - Assurance Cases for Software-intensive Systems; DECSoS'15 - EWICS/ERCIM/ARTEMIS Dependable Cyber-physical Systems and Systems-of-Systems Workshop; ISSE'15 - International workshop on the Integration of Safety and Security Engineering; ReSA4CI 2015 - International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection; SASSUR 2015 - International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems.

Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings... Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings (Paperback, 1st ed. 2015)
Javier Lopez, Chris J. Mitchell
R2,662 R2,038 Discovery Miles 20 380 Save R624 (23%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings... Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Mauro Conti, Matthias Schunter, Ioannis Askoxylakis
R2,077 R1,474 Discovery Miles 14 740 Save R603 (29%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2,... Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings (Paperback, 1st ed. 2015)
Simone Fischer-Hubner, Costas Lambrinoudakis, Javier Lopez
R1,643 R938 Discovery Miles 9 380 Save R705 (43%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; trust and reputation in pervasive environments; trust and privacy issues in mobile environments; security and privacy in the cloud; security policies/usability issues; and privacy requirements and privacy audit.

Advances in Cryptology -- CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015,... Advances in Cryptology -- CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I (Paperback, 1st ed. 2015)
Rosario Gennaro, Matthew Robshaw
R2,554 R2,080 Discovery Miles 20 800 Save R474 (19%) Ships in 10 - 15 working days

The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.

Progress in Cryptology -- LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin... Progress in Cryptology -- LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Kristin Lauter, Francisco Rodriguez-henriquez
R2,136 R1,532 Discovery Miles 15 320 Save R604 (28%) Ships in 10 - 15 working days

This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They were organized in topical sections named: cryptographic protocols; foundations; post-quantum cryptography; symmetric key cryptanalysis; we still love pairings; curves in cryptography; and cryptographic engineering.

Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28,... Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings (Paperback, 1st ed. 2015)
Keisuke Tanaka, Yuji Suga
R2,108 R1,505 Discovery Miles 15 050 Save R603 (29%) Ships in 10 - 15 working days

This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 58 submissions. They were organized in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable security; LWE-based encryption; privacy-preserving and anonymity; secure protocol; systems security; and security in hardware.

Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Paperback): Ken... Supply Chain Risk Management - Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Paperback)
Ken Sigler, Dan Shoemaker, Anne Kohnke
R1,454 Discovery Miles 14 540 Ships in 10 - 15 working days

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

Stabilization, Safety, and Security of Distributed Systems - 17th International Symposium, SSS 2015, Edmonton, AB, Canada,... Stabilization, Safety, and Security of Distributed Systems - 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings (Paperback, 1st ed. 2015)
Andrzej Pelc, Alexander A Schwarzmann
R1,935 R1,229 Discovery Miles 12 290 Save R706 (36%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17 International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2015, held in Edmonton, AB, Canada, in August 2015. The 16 regular papers presented together with 8 brief announcements and 3 keynote lectures were carefully reviewed and selected from 38 submissions. The Symposium is organized in several tracks, reflecting topics to self-*properties. The tracks are self-stabilization; fault-tolerance and dependability; ad-hoc and sensor networks; mobile agents; system security in distributed computing; and formal methods and distributed algorithms.

Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised... Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Yun Qing Shi, Hyoung Joong Kim, Fernando Perez-Gonzalez, Ching-Nung Yang
R2,716 R2,201 Discovery Miles 22 010 Save R515 (19%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Workshop on Digital-Forensics and Watermarking, IWDW 2014, held in Taipei, Taiwan, during October 2014. The 32 full and 14 poster papers, presented together with 1 keynote speech, were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on forensics; watermarking; reversible data hiding; visual cryptography; and steganography and steganalysis.

Intelligent Mechanisms for Network Configuration and Security - 9th IFIP WG 6.6 International Conference on Autonomous... Intelligent Mechanisms for Network Configuration and Security - 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings (Paperback, 2015 ed.)
Steven Latre, Marinos Charalambides, Jerome Francois, Corinna Schmitt, Burkhard Stiller
R1,686 R1,206 Discovery Miles 12 060 Save R480 (28%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th IFIP WG 6.6 International Conference on Intelligent Mechanisms for Network Configuration and Security, AIMS 2015, held in Ghent, Belgium, in June 2015. The 7 full papers presented in this book were carefully reviewed and selected from 22 submissions. The volume also includes 9 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 24 submissions. The full papers are organized in topical sections on autonomic and decentralized management and security, privacy, and measurements. The workshop papers are organized in topical sections on management of future networking and security management.

Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019): Song Y. Yan Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019)
Song Y. Yan
R3,023 R2,360 Discovery Miles 23 600 Save R663 (22%) Ships in 10 - 15 working days

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015,... Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger (Paperback, 2015 ed.)
Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi
R1,643 R1,536 Discovery Miles 15 360 Save R107 (7%) Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015. The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.

Building an Effective IoT Ecosystem for Your Business (Hardcover, 1st ed. 2017): Sudhi R. Sinha, Youngchoon Park Building an Effective IoT Ecosystem for Your Business (Hardcover, 1st ed. 2017)
Sudhi R. Sinha, Youngchoon Park
R3,346 R2,904 Discovery Miles 29 040 Save R442 (13%) Ships in 10 - 15 working days

This descriptive, practical guide explains how to build a commercially impactful, operationally effective and technically robust IoT ecosystem that takes advantage of the IoT revolution and drives business growth in the consumer IoT as well as industrial internet spaces. With this book, executives, business managers, developers and decision-makers are given the tools to make more informed decisions about IoT solution development, partner eco-system design, and the monetization of products and services. Security and privacy issues are also addressed. Readers will explore the design guidelines and technology choices required to build commercially viable IoT solutions, but also uncover the various monetization and business modeling for connected products.

Linux Essentials for Cybersecurity (Paperback): William Rothwell, Denise Kinsey Linux Essentials for Cybersecurity (Paperback)
William Rothwell, Denise Kinsey
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT professionals Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage. Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William "Bo" Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated. First, you'll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you'll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you'll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more. To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training. LEARN HOW TO: Review Linux operating system components from the standpoint of security Master key commands, tools, and skills for securing Linux systems Troubleshoot common Linux security problems, one step at a time Protect user and group accounts with Pluggable Authentication Modules (PAM), SELinux, passwords, and policies Safeguard files and directories with permissions and attributes Create, manage, and protect storage devices: both local and networked Automate system security 24/7 by writing and scheduling scripts Maintain network services, encrypt network connections, and secure network-accessible processes Examine which processes are running-and which may represent a threat Use system logs to pinpoint potential vulnerabilities Keep Linux up-to-date with Red Hat or Debian software management tools Modify boot processes to harden security Master advanced techniques for gathering system information

Network and Parallel Computing - 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 - December... Network and Parallel Computing - 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 - December 1, 2018, Proceedings (Paperback, 1st ed. 2018)
Feng Zhang, Jidong Zhai, Marc Snir, Hai Jin, Hironori Kasahara, …
R1,258 R1,110 Discovery Miles 11 100 Save R148 (12%) Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th IFIP International Conference on Network and Parallel Computing, NPC 2018, held in Muroran, Japan, in November/December 2018. The 22 full and 12 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The papers cover traditional areas of network and parallel computing, including parallel applications, distributed algorithms, parallel architectures, software environments, and distributed tools.

Communication Systems and Networks - 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018,... Communication Systems and Networks - 10th International Conference, COMSNETS 2018, Bangalore, India, January 3-7, 2018, Extended Selected Papers (Paperback, 1st ed. 2019)
Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, …
R1,466 R1,284 Discovery Miles 12 840 Save R182 (12%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Communication Systems and Networks, COMSNETS 2018, held in Banaglore, India, in January 2018.The 12 revised full papers presented in this book were carefully reviewed and selected from 134 submissions. They cover various topics in networking and communications systems.

Blackstone's Handbook of Cyber Crime Investigation (Paperback): Andrew Staniforth, Police National Legal Database (Pnld),... Blackstone's Handbook of Cyber Crime Investigation (Paperback)
Andrew Staniforth, Police National Legal Database (Pnld), Babak Akhgar, Francesca Bosco
R905 Discovery Miles 9 050 Ships in 10 - 15 working days

Blackstone's Handbook of Cyber Crime Investigation provides a clear and detailed introduction to cyber crime, offering you an effective operational guide to the complexities and challenges of investigating cyber-related crimes. Written by a team of experts, this unique book provides police officers with an operational reference and resource addressing all manner of cyber crime threats, including online anti-social behaviour and hate crimes, organised cyber crime and fraud, online child exploitation and cyber terrorism. Presented in four main parts, Parts 1 and 2 offer an overview of the different types of cyber crime and explanations of the national structures and strategies in place to combat them, as well as case studies and scenarios. Part 3 offers practical guidance on the investigation of cyber crimes, developed with the support and guidance of a multi-disciplinary team of cyber experts from policing, academia and private industry, and Part 4 covers the key legislation, police powers and points to prove relevant to each key category of offending and is written by the Police National Legal Database. All sections in Part 4 are accompanied by explanatory notes and related case law, ensuring quick and clear translation of cyber crime powers and provisions. Concise and accessible, this book is an ideal reference and resource for all operational police officers, the extended police family and partners working to keep communities safe from the online phenomenon of cyber crime.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite... Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings (Paperback, 1st ed. 2018)
Guojun Wang, Jinjun Chen, Laurence T. Yang
R2,084 R1,796 Discovery Miles 17 960 Save R288 (14%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 45 revised full papers were carefully reviewed and selected from 120 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges - ICBCC 2019, UMKC, Kansas City, USA... Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges - ICBCC 2019, UMKC, Kansas City, USA (Hardcover, 1st ed. 2020)
V. Vijayakumar, V. Neelanarayanan, Praveen Rao, Janet Light
R3,494 R3,117 Discovery Miles 31 170 Save R377 (11%) Ships in 10 - 15 working days

The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on how to address the current challenges in the field. As such it is a valuable reference resource for researchers and practitioners in academia and industry.

Personal Cybersecurity - How to Avoid and Recover from Cybercrime (Paperback, 1st ed.): Marvin Waschke Personal Cybersecurity - How to Avoid and Recover from Cybercrime (Paperback, 1st ed.)
Marvin Waschke
R1,078 R933 Discovery Miles 9 330 Save R145 (13%) Ships in 10 - 15 working days

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.

CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide (Hardcover, Ed): Bobby Rogers, Dawn Dunkerley CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide (Hardcover, Ed)
Bobby Rogers, Dawn Dunkerley
R1,380 R791 Discovery Miles 7 910 Save R589 (43%) Ships in 10 - 15 working days

An all-new exam guide for the industry-standard information technology risk certification, Certified in Risk and Information Systems Control (CRISC)Prepare for the updated Certified in Risk and Information Systems Control (CRISC) certification exam with this comprehensive exam guide. CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide covers all four exam domains effective as of June 2015 and contains hundreds of realistic practice exam questions. Fulfilling the promise of the All-in-One series, this reference guide serves as a test preparation tool AND an on-the-job reference that will serve you well beyond the examination. To aid in self-study, each chapter includes Exam Tips that highlight key information about the exam, chapter summaries that reinforce the chapter's salient points, and end-of-chapter questions that are accurate to the content and question format of the real exam. 100% coverage of the CRISC certification job practice areas effective as of June 2015Includes hands-on exercises for additional practice and Notes, Tips, and Cautions which provide real-world insights CD-ROM features two full-length, customizable practice exams in the Total Tester exam engine and a PDF eBook

Cyber Security Policy Guidebook (Hardcover, New): Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey... Cyber Security Policy Guidebook (Hardcover, New)
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, …
R1,989 R1,797 Discovery Miles 17 970 Save R192 (10%) Ships in 10 - 15 working days

Drawing upon a wealth of experience from academia, industry, and government service, "Cyber Security Policy Guidebook" details and dissects, in simple language, current organizational cyber security policy issues on a global scale--taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions--as well as the pros and cons--of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices.

Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policyDiscuss the process by which cyber security policy goals are setEducate the reader on decision-making processes related to cyber securityDescribe a new framework and taxonomy for explaining cyber security policy issuesShow how the U.S. government is dealing with cyber security policy issues

With a glossary that puts cyber security language in layman's terms--and diagrams that help explain complex topics--"Cyber Security Policy Guidebook" gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.

Security of e-Systems and Computer Networks (Hardcover): Mohammad Obaidat, Noureddine Boudriga Security of e-Systems and Computer Networks (Hardcover)
Mohammad Obaidat, Noureddine Boudriga
R2,127 Discovery Miles 21 270 Ships in 10 - 15 working days

E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.

Current Trends in Cyber Security (Hardcover): Neil Kent, Irina du Quenoy Current Trends in Cyber Security (Hardcover)
Neil Kent, Irina du Quenoy
R5,013 R4,146 Discovery Miles 41 460 Save R867 (17%) Ships in 10 - 15 working days

This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors-all leaders in their fields-have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify patterns of analytical error that may guide security officials and policymakers as they examine the issue of cyber security before them today. French military academy instructor Thomas Flichy de La Neuville suggests another historical parallel, locating an important precursor to current debates about internet freedom in the waning control of information during the French Revolution. Italian academics Alessandro Guarino and Emilio Iasiellotake up an industrial case study, that of self-driving motor vehicles, to examine how cyberthreats might effect business and industry as they become ever more dependent on technology in the twenty-first century. Finally, the Indian scholar Sushma Devi presents a national case study, that of her native India, to assess how one of the world's most dynamic emerging economies is facing up to what was originally a first world problem. This collection anticipates endless analysis of the rapidly expanding nexus of cyber security and intelligence. It will be of undoubted use to anyone concerned with technology, the security of online business presences, national security, communications, and any other field of endeavor that will benefit from the knowledge of experts in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
70 Tips and Tricks for Mastering the…
R. Sarma Danturthi Paperback R813 R636 Discovery Miles 6 360
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,353 Discovery Miles 13 530
Hacking Exposed Computer Forensics
Aaron Philipp Hardcover R1,591 R1,206 Discovery Miles 12 060
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia Paperback R1,499 Discovery Miles 14 990
Codes, Cryptology and Curves with…
Ruud Pellikaan, Xin-Wen Wu, … Paperback R1,237 Discovery Miles 12 370
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, … Paperback R946 R578 Discovery Miles 5 780
Intelligence-Driven Incident Response
Scott Roberts, Rebekah Brown Paperback R1,386 R799 Discovery Miles 7 990

 

Partners