Your cart

Your cart is empty

Browse All departments
  • R100 - R250 (1,645)
  • R250 - R500 (720)
  • R500+ (5,140)
  • -
Author / Contributor

Books > Computing & IT > Computer communications & networking > Network security

Information Theoretic Security - 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012,... Information Theoretic Security - 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings (Paperback, 2012 ed.)
Adam Smith
R1,162 R969 Discovery Miles 9 690 Save R193 (17%) Ships in 10 - 15 working days

This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.

Cyberdanger - Understanding and Guarding Against Cybercrime (Hardcover, 1st ed. 2019): Eddy Willems Cyberdanger - Understanding and Guarding Against Cybercrime (Hardcover, 1st ed. 2019)
Eddy Willems
R530 R485 Discovery Miles 4 850 Save R45 (8%) Ships in 10 - 15 working days

This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It's also a valuable introduction for the general reader who wants to learn about cybersecurity.

Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Hardcover, 2nd ed. 2015): Feng Liu,... Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Hardcover, 2nd ed. 2015)
Feng Liu, Weiqi Yan
R1,898 R1,604 Discovery Miles 16 040 Save R294 (15%) Ships in 10 - 15 working days

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with new content on braille and 2D barcode authentication of visual cryptography shares. Features: contains review exercises at the end of each chapter, as well as a helpful glossary; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptography and security enriched VCS; describes different methods for presenting color content using visual cryptographic techniques; covers such applications of visual cryptography as watermarking, resolution variant VCS, and multiple resolution VCS.

Cisco ASA Configuration (Paperback, Ed): Richard Deal Cisco ASA Configuration (Paperback, Ed)
Richard Deal
R1,324 R1,008 Discovery Miles 10 080 Save R316 (24%) Ships in 7 - 11 working days

"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems

A hands-on guide to implementing Cisco ASA

Configure and maintain a Cisco ASA platform to meet the requirements of your security policy. Cisco ASA Configuration shows you how to control traffic in the corporate network and protect it from internal and external threats. This comprehensive resource covers the latest features available in Cisco ASA version 8.0, and includes detailed examples of complex configurations and troubleshooting. Implement and manage Cisco's powerful, multifunction network adaptive security appliance with help from this definitive guide. Configure Cisco ASA using the command-line interface (CLI) and Adaptive Security Device Manager (ASDM)Control traffic through the appliance with access control lists (ACLs) and object groupsFilter Java, ActiveX, and web content Authenticate and authorize connections using Cut-through Proxy (CTP)Use Modular Policy Framework (MPF) to configure security appliance featuresPerform protocol and application inspectionEnable IPSec site-to-site and remote access connectionsConfigure WebVPN components for SSL VPN accessImplement advanced features, including the transparent firewall, security contexts, and failoverDetect and prevent network attacksPrepare and manage the AIP-SSM and CSC-SSM cards

IT Disaster Response - Lessons Learned in the Field (Paperback, 1st ed.): Greg D. Moore IT Disaster Response - Lessons Learned in the Field (Paperback, 1st ed.)
Greg D. Moore
R1,034 R764 Discovery Miles 7 640 Save R270 (26%) Ships in 10 - 15 working days

Learn how to develop solutions to handle disasters both large and small. Real-world scenarios illustrate the importance of disaster response (DR) planning. IT Disaster Response takes a different approach to IT disaster response plans. Rather than focusing on details such as what hardware you should buy or what software you need to have in place, the book focuses on the management of a disaster and various management and communication tools you can use before and during a disaster. This book examines disasters in general-a compilation of lessons the author learned over the course of years working in IT, reviewing plane crashes, and his experiences as a cave rescuer and cave rescue instructor. Although at first it may seem that none of these are really related, the truth is they all have elements in common. In each case, the unexpected has happened. Just as not all plane crashes are deadly, not all IT mishaps have terrible consequences. With the proper training and approach, many problems can either be avoided in the first place or better handled if they do arise. The book contains practical guidance on: How to think about a disaster both before it happens and while it's happening How to apply management skills used in other fields during disasters How to get everyone on board when it comes to planning for and handling disasters How to better deal with smaller, more manageable-and more frequently occurring-disasters What you'll learn Discover the difference between a DR solution and a DR plan Define a disaster - it's not always of the scale of a fire burning down the building. See when to actually implement your DR plan Who This Book Is For IT professionals in charge of developing their company's disaster recovery plan who also need to raise issues to the required C-level people to make sure they have a viable plan.

Reinforcement Learning for Cyber-Physical Systems - with Cybersecurity Case Studies (Hardcover): Chong Li, Meikang Qiu Reinforcement Learning for Cyber-Physical Systems - with Cybersecurity Case Studies (Hardcover)
Chong Li, Meikang Qiu
R1,942 R1,838 Discovery Miles 18 380 Save R104 (5%) Ships in 10 - 15 working days

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.

Computer Security: Principles and Practice, Global Edition (Paperback, 4th edition): William Stallings, Lawrie Brown Computer Security: Principles and Practice, Global Edition (Paperback, 4th edition)
William Stallings, Lawrie Brown
R1,362 Discovery Miles 13 620 Ships in 10 - 15 working days

For courses in computer/network security Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate-and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the 'gold standard' when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more.

Transactions on Computational Science XXXII - Special Issue on Cybersecurity and Biometrics (Paperback, 1st ed. 2018): Marina... Transactions on Computational Science XXXII - Special Issue on Cybersecurity and Biometrics (Paperback, 1st ed. 2018)
Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin
R1,382 R1,275 Discovery Miles 12 750 Save R107 (8%) Ships in 10 - 15 working days

This, the 32nd issue of the Transactions on Computational Science, focusses on cybersecurity and biometrics. The eight detailed papers cover the following topics: Multimodal Warnings for Distracted Smartphone Users on the Move; EEG-Based Mental Workload and Stress Monitoring of Crew Members in a Maritime Virtual Simulator; Detecting Web Defacement and Enabling Web-Content Regeneration; Software as a Weapon in the Context of (Inter)national Security; Multi-user Architecture and Multi-player Games; An Adaptive Discrete Wavelet Transform Based Face Recognition Approach; Synthesizing Images of Imagined Faces Based on Relevance Feedback; and Neurofeedback Training to Enhance the Focused Attention of Elite Rifle Shooters.

Attribution of Advanced Persistent Threats - How to Identify the Actors Behind Cyber-Espionage (Hardcover, 2020 ed.): Timo... Attribution of Advanced Persistent Threats - How to Identify the Actors Behind Cyber-Espionage (Hardcover, 2020 ed.)
Timo Steffens
R2,129 Discovery Miles 21 290 Ships in 7 - 11 working days

An increasing number of countries develop capabilities for cyber-espionage and sabotage. The sheer number of reported network compromises suggests that some of these countries view cyber-means as integral and well-established elements of their strategical toolbox. At the same time the relevance of such attacks for society and politics is also increasing. Digital means were used to influence the US presidential election in 2016, repeatedly led to power outages in Ukraine, and caused economic losses of hundreds of millions of dollars with a malfunctioning ransomware. In all these cases the question who was behind the attacks is not only relevant from a legal perspective, but also has a political and social dimension. Attribution is the process of tracking and identifying the actors behind these cyber-attacks. Often it is considered an art, not a science. This book systematically analyses how hackers operate, which mistakes they make, and which traces they leave behind. Using examples from real cases the author explains the analytic methods used to ascertain the origin of Advanced Persistent Threats.

Bullae from the Shara Temple - With Contributions by Hamza Shahad Al-Harbi and Adelheid Otto (Hardcover): Nawala Ahmed... Bullae from the Shara Temple - With Contributions by Hamza Shahad Al-Harbi and Adelheid Otto (Hardcover)
Nawala Ahmed Al-Mutawilli, Ismael, Walther Sallaberger
R1,638 R1,435 Discovery Miles 14 350 Save R203 (12%) Ships in 10 - 15 working days
Network Security For Dummies (Paperback): Chey Cobb Network Security For Dummies (Paperback)
Chey Cobb
R667 R468 Discovery Miles 4 680 Save R199 (30%) Ships in 10 - 15 working days

* This hands-on, do-it-yourself guide to securing and auditing a network offers immediate solutions to critical security problems for small- to medium-sized businesses
* Each part of the book begins with basics that can be quickly implemented and then moves on to more complex security mechanisms a company may consider as it grows
* Presents numerous checklists and exercises for performing network security audits
* Includes real-world examples and practical tips for implementing cost-effective security measures
* Companion Web site includes forms and checklists along with links to useful sites and downloads for recommended security tools

The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Hardcover): Kevin D. Mitnick,... The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Hardcover)
Kevin D. Mitnick, William L Simon
R905 R610 Discovery Miles 6 100 Save R295 (33%) Ships in 10 - 15 working days

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling "The Art of Deception"
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machinesTwo teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systemsTwo convicts who joined forces to become hackers inside a Texas prisonA "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained accessWith riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Fundamentals Of Communications And Networking (Paperback, 2nd Revised edition): Michael G. Solomon, David Kim, Jeffrey L Carrell Fundamentals Of Communications And Networking (Paperback, 2nd Revised edition)
Michael G. Solomon, David Kim, Jeffrey L Carrell
R1,949 Discovery Miles 19 490 Ships in 10 - 15 working days

Today's Networks Are Required To Support An Increasing Array Of Real-Time Communication Methods. Video Chat, Real-Time Messaging, And Always-Connected Resources Put Demands On Networks That Were Previously Unimagined. The Second Edition Of Fundamentals Of Communications And Networking Helps Readers Better Understand Today's Networks And The Way They Support The Evolving Requirements Of Different Types Of Organizations. It Discusses The Critical Issues Of Designing A Network That Will Meet An Organization's Performance Needs And Discusses How Businesses Use Networks To Solve Business Problems. Using Numerous Examples And Exercises, This Text Incorporates Hands-On Activities To Prepare Readers To Fully Understand And Design Modern Networks And Their Requirements. Key Features Of The Second Edition: - Introduces Network Basics By Describing How Networks Work - Discusses How Networks Support The Increasing Demands Of Advanced Communications - Illustrates How To Map The Right Technology To An Organization's Needs And Business Goals - Outlines How Businesses Use Networks To Solve Business Problems, Both Technically And Operationally.

Securing the Cloud - Security Strategies for the Ubiquitous Data Center (Hardcover): Curtis Franklin Jr., Brian Chee Securing the Cloud - Security Strategies for the Ubiquitous Data Center (Hardcover)
Curtis Franklin Jr., Brian Chee
R1,575 R1,492 Discovery Miles 14 920 Save R83 (5%) Ships in 10 - 15 working days

This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.

Secure ICT Service Provisioning for Cloud, Mobile and Beyond - ESARIS: The Answer to the Demands of Industrialized IT... Secure ICT Service Provisioning for Cloud, Mobile and Beyond - ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providers (Hardcover, 2nd updated and extended ed. 2017)
Eberhard von Faber, Wolfgang Behnsen
R1,355 R1,232 Discovery Miles 12 320 Save R123 (9%) Ships in 10 - 15 working days

This book describes new methods and measures which enable ICT service providers and large IT departments to provide secure ICT services in an industrialized IT production environment characterized by rigorous specialization, standardization and division of labor along the complete supply chain. This book is also for suppliers playing their role in this industry. Even more important, user organizations are given deep insight in secure IT production which allows them to make the best out of cloud, mobile and beyond. This book presents a new organization and classification scheme being thoroughly modular and hierarchical. It contains a security taxonomy that organizes all aspects of modern industrialized IT production. The approach takes operational requirements into account and focuses on user requirements, thus facing the reality in the market economy. Despite cost pressure, providers must ensure security by exploiting economies of scale to raise the efficiency also with respect to security. Furthermore, this book describes a wealth of security measures derived from real-world challenges in IT production and IT service management.

Women in Security - Changing the Face of Technology and Innovation (Hardcover, 1st ed. 2018): Debra A. Christofferson Women in Security - Changing the Face of Technology and Innovation (Hardcover, 1st ed. 2018)
Debra A. Christofferson
R2,240 Discovery Miles 22 400 Ships in 10 - 15 working days

This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field's evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how. After an overview of the field, female security professionals share their own stories of technology and innovation in security today; the foundation, where research is headed, and the emerging trends. Women currently make up a very small pocket of cyber security staffing - this book aims to increase the visibility of women in the field and their contributions and encourage other females to join the field. The contributors hold various roles from executive leadership, to engineers, analysts, and researchers.

IT Security Risk Management in the Context of Cloud Computing - Towards an Understanding of the Key Role of Providers' IT... IT Security Risk Management in the Context of Cloud Computing - Towards an Understanding of the Key Role of Providers' IT Security Risk Perceptions (Paperback, 1st ed. 2015)
Andre Loske
R1,788 R1,409 Discovery Miles 14 090 Save R379 (21%) Ships in 10 - 15 working days

This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers' decision makers significantly underestimate their services' IT security risk exposure, which inhibits the implementation of necessary safeguarding measures. The work also demonstrates that even though the prevalence of IT security risk concerns in Cloud adoption is widely recognized, providers only pay very limited attention to the concerns expressed by customers, which not only causes serious disagreements with the customers but also considerably inhibits the adoption of the services.

Defensive Security Handbook (Paperback): Lee Brotherston, Amanda Berlin Defensive Security Handbook (Paperback)
Lee Brotherston, Amanda Berlin
R1,166 R679 Discovery Miles 6 790 Save R487 (42%) Ships in 10 - 15 working days

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring

Cyberspace in Peace and War (Hardcover): Martin Libicki Cyberspace in Peace and War (Hardcover)
Martin Libicki
R1,454 R1,266 Discovery Miles 12 660 Save R188 (13%) Ships in 10 - 15 working days

This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.). Although written from a U.S. perspective, most of its contents are globally relevant. It is written essentially in four sections. The first (chapters 1 - 5) describes how compromises of computers and networks permit unauthorized parties to extract information from such systems (cyber-espionage), and/or to force these systems to misbehave in ways that disrupt their operations or corrupt their workings. The section examines notable hacks of systems, fundamental challenges to cybersecurity (e.g., the lack of forced entry, the measure-countermeasure relationship) including the role of malware, and various broad approaches to cybersecurity. The second (chapters 6 - 9) describes what government policies can, and, as importantly, cannot be expected to do to improve a nation's cybersecurity thereby leaving leave countries less susceptible to cyberattack by others. Among its focus areas are approaches to countering nation-scale attacks, the cost to victims of broad-scale cyberespionage, and how to balance intelligence and cybersecurity needs. The third (chapters 10 - 15) looks at cyberwar in the context of military operations. Describing cyberspace as the 5th domain of warfare feeds the notion that lessons learned from other domains (e.g., land, sea) apply to cyberspace. In reality, cyberwar (a campaign of disrupting/corrupting computers/networks) is quite different: it rarely breaks things, can only be useful against a sophisticated adversary, competes against cyber-espionage, and has many first-strike characteristics. The fourth (chapters 16 - 35) examines strategic cyberwar within the context of state-on-state relations. It examines what strategic cyberwar (and threats thereof) can do against whom - and how countries can respond. It then considers the possibility and limitations of a deterrence strategy to modulate such threats, covering credibility, attribution, thresholds, and punishment (as well as whether denial can deter). It continues by examining sub rosa attacks (where neither the effects nor the attacker are obvious to the public); the role of proxy cyberwar; the scope for brandishing cyberattack capabilities (including in a nuclear context); the role of narrative and signals in a conflict in cyberspace; questions of strategic stability; and norms for conduct in cyberspace (particularly in the context of Sino-U.S. relations) and the role played by international law. The last chapter considers the future of cyberwar.

Guide to Security Assurance for Cloud Computing (Hardcover, 1st ed. 2015): Shao Ying Zhu, Richard Hill, Marcello Trovati Guide to Security Assurance for Cloud Computing (Hardcover, 1st ed. 2015)
Shao Ying Zhu, Richard Hill, Marcello Trovati
R1,526 R1,227 Discovery Miles 12 270 Save R299 (20%) Ships in 10 - 15 working days

This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry. Topics and features: * Describes the important general concepts and principles of security assurance in cloud-based environments * Presents applications and approaches to cloud security that illustrate the current state of the art * Reviews pertinent issues in relation to challenges that prevent organizations moving to cloud architectures * Provides relevant theoretical frameworks and the latest empirical research findings * Discusses real-world vulnerabilities of cloud-based software in order to address the challenges of securing distributed software * Highlights the practicalities of cloud security, and how applications can assure and comply with legislation * Includes review questions at the end of each chapter This Guide to Security Assurance for Cloud Computing will be of great benefit to a broad audience covering enterprise architects, business analysts and leaders, IT infrastructure managers, cloud security engineers and consultants, and application developers involved in system design and implementation. The work is also suitable as a textbook for university instructors, with the outline for a possible course structure suggested in the preface. The editors are all members of the Computing and Mathematics Department at the University of Derby, UK, where Dr. Shao Ying Zhu serves as a Senior Lecturer in Computing, Dr. Richard Hill as a Professor and Head of the Computing and Mathematics Department, and Dr. Marcello Trovati as a Senior Lecturer in Mathematics. The other publications of the editors include the Springer titles Big-Data Analytics and Cloud Computing, Guide to Cloud Computing and Cloud Computing for Enterprise Architectures.

Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International... Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers (Hardcover, 1st ed. 2016)
Anja Lehmann, Diane Whitehouse, Simone Fischer-Hubner, Lothar Fritsch, Charles Raab
R1,771 R1,605 Discovery Miles 16 050 Save R166 (9%) Ships in 10 - 15 working days

This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016. The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.

Kish Cypher, The: The Story Of Kljn For Unconditional Security (Hardcover): Laszlo B. Kish Kish Cypher, The: The Story Of Kljn For Unconditional Security (Hardcover)
Laszlo B. Kish
R3,099 R2,879 Discovery Miles 28 790 Save R220 (7%) Ships in 10 - 15 working days

Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.This book clarifies the misinformation behind heated debates on the 'Kish Cypher' (the popular but incorrect name for the Kirchhoff-Law-Johnson-Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut treatments to explain the protocol's working principle - an understanding that has eluded (even) several experts of computer science, quantum security, and electrical engineering. The work also explains how the scheme can provide the same (or higher) level of security as quantum communicators at a thousandth of the cost.The contents of this text address both layman and expert levels of understanding.

Biosensors for Security and Bioterrorism Applications (Hardcover, 1st ed. 2016): Dimitrios P. Nikolelis, Georgia-Paraskevi... Biosensors for Security and Bioterrorism Applications (Hardcover, 1st ed. 2016)
Dimitrios P. Nikolelis, Georgia-Paraskevi Nikoleli
R4,871 R4,011 Discovery Miles 40 110 Save R860 (18%) Ships in 10 - 15 working days

This book offers comprehensive coverage of biomarker/biosensor interactions for the rapid detection of weapons of bioterrorism, as well as current research trends and future developments and applications. It will be useful to researchers in this field who are interested in new developments in the early detection of such. The authors have collected very valuable and, in some aspects indispensable experience in the area i.e. in the development and application of portable biosensors for the detection of potential hazards. Most efforts are centered on the development of immunochemical assays including flow-lateral systems and engineered antibodies and their fragments. In addition, new approaches to the detection of enzyme inhibitors, direct enzymatic and microbial detection of metabolites and nutrients are elaborated. Some realized prototypes and concept devices applicable for the further use as a basis for the cooperation programs are also discussed.There is a particular focus on electrochemical and optical detection systems,including those employing carbon nanotubes, quantum dots and metalnanoparticles. The authors are well-known scientists and most of them are editors of respected international scientific journals. Although recently developed biosensors utilize known principles, the biosensing devices described can significantly shorten the time required for successful detection and enhance efforts in more time-consuming directions, e.g. remote sensing systems and validation in real-sample analysis.The authors describe advances in all stages of biosensor development: theselection of biochemical components, their use in biosensor assembly, detection principles and improvements and applications for real sample assays.

Security and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing... Security and Cooperation in Wireless Networks - Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (Hardcover)
Levente Buttyan, Jean-Pierre Hubaux
R1,551 Discovery Miles 15 510 Ships in 10 - 15 working days

This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their implications explained in terms of security and cooperation, and potential malicious and selfish misdeeds are described along with the existing and future security techniques. Fundamental questions of security including user and device identification; establishment of security association; secure and cooperative routing in multi-hop networks; fair bandwidth distribution; and privacy protection are approached from a theoretical perspective and supported by real-world examples including ad hoc, mesh, vehicular, sensor, and RFID networks. Important relationships between trust, security, and cooperation are also discussed. Contains homework problems and tutorials on cryptography and game theory. This text is suitable for advanced undergraduates and graduate students of electrical engineering and computer science, and researchers and practitioners in the wireless industry. Lecture slides and instructor-only solutions available online (www.cambridge.org/9780521873710).

Physical Security: 150 Things You Should Know (Paperback, 2nd edition): Lawrence J Fennelly, Marianna Perry Physical Security: 150 Things You Should Know (Paperback, 2nd edition)
Lawrence J Fennelly, Marianna Perry
R1,392 R1,317 Discovery Miles 13 170 Save R75 (5%) Ships in 10 - 15 working days

Physical Security: 150 Things You Should Know, Second Edition is a useful reference for those at any stage of their security career. This practical guide covers the latest technological trends for managing the physical security needs of buildings and campuses of all sizes. Through anecdotes, case studies, and documented procedures, the authors have amassed the most complete collection of information on physical security available. Security practitioners of all levels will find this book easy to use as they look for practical tips to understand and manage the latest physical security technologies, such as biometrics, IP video, video analytics, and mass notification, as well as the latest principles in access control, command and control, perimeter protection, and visitor management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA CySA+ Practice Tests - Exam…
Mike Chapple, David Seidl Paperback R933 R552 Discovery Miles 5 520
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,353 Discovery Miles 13 530
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
Cyberpower and National Security
Larry Wentz, Stuart H. Starr, … Paperback R679 R508 Discovery Miles 5 080
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,565 Discovery Miles 15 650
Codes, Cryptology and Curves with…
Ruud Pellikaan, Xin-Wen Wu, … Paperback R1,237 Discovery Miles 12 370
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
Intelligence-Driven Incident Response
Scott Roberts, Rebekah Brown Paperback R1,386 R799 Discovery Miles 7 990
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R123 Discovery Miles 1 230
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800