0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,505)
  • R250 - R500 (663)
  • R500+ (4,495)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Ad Hoc Networks - 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers... Ad Hoc Networks - 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers (Paperback, 2014)
Mostafa Hashem Sherif, Abdelhamid Mellouk, Jun Li, Paolo Bellavista
R1,236 R1,159 Discovery Miles 11 590 Save R77 (6%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, commercial and military such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks and large-scale metropolitan networks for smart cities. They are organized in topical sections on wireless sensor networks, routing, applications and security.

Transactions on Computational Science XXVIII - Special Issue on Cyberworlds and Cybersecurity (Paperback, 1st ed. 2016): Marina... Transactions on Computational Science XXVIII - Special Issue on Cyberworlds and Cybersecurity (Paperback, 1st ed. 2016)
Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin
R1,931 R1,764 Discovery Miles 17 640 Save R167 (9%) Ships in 10 - 15 working days

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, encompassing the facilitating theoretical foundations and the applications of large-scale computations and massive data processing. It addresses researchers and practitioners in areas ranging from aerospace to biochemistry, from electronics to geosciences, from mathematics to software architecture, presenting verifiable computational methods, findings, and solutions, and enabling industrial users to apply techniques of leading-edge, large-scale, high performance computational methods. This, the 28th issue of the Transactions on Computational Science journal, is comprised of extended versions of selected papers from the International Conference on Cyberworlds, CyberWorlds 2015, held in Gotland, Sweden, in October 2015. The first paper is a position paper, presenting open problems and identifying future directions within the domain. The remaining 8 papers focus on a range of topics, including virtual reality, games, haptic modeling, cybersecurity, brain wave analysis, shape parameterization, projects, and data mining.

Cyber law in Australia (Paperback, 2nd edition): George Cho, Zbynek Loebl, Tomas Grivna Cyber law in Australia (Paperback, 2nd edition)
George Cho, Zbynek Loebl, Tomas Grivna
R3,136 Discovery Miles 31 360 Ships in 7 - 11 working days
Inside Radio: An Attack and Defense Guide (Hardcover, 1st ed. 2018): Qing Yang, Lin Huang Inside Radio: An Attack and Defense Guide (Hardcover, 1st ed. 2018)
Qing Yang, Lin Huang
R1,834 R1,699 Discovery Miles 16 990 Save R135 (7%) Ships in 10 - 15 working days

This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.

Information Security - Cyberattacks, Data Breaches and Security Controls (Hardcover): Paul Scholz Information Security - Cyberattacks, Data Breaches and Security Controls (Hardcover)
Paul Scholz
R5,478 R3,979 Discovery Miles 39 790 Save R1,499 (27%) Ships in 10 - 15 working days

Federal agencies and our nation's critical infrastructures, such as communications and financial services, are dependent on information technology systems and electronic data to carry out operations and to process, maintain, and report essential information. Yet, cyber-based intrusions and attacks on federal and nonfederal systems have become not only more numerous and diverse, but also more damaging and disruptive as discussed in chapter 1. The IRS has a demanding responsibility to collect taxes, process tax returns, and enforce the nation's tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the sensitive financial and taxpayer information that reside on those systems. As part of its audit of IRS's fiscal year 2017 and 2016 financial statements, GAO assessed whether controls over financial and tax processing systems were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information as reported in chapter 2. Reliance on a global supply chain introduces multiple risks to federal information systems. Chapter 3 highlights information security risks associated with the supply chains used by federal agencies to procure IT systems. The Office of Personnel Management (OPM) collects and maintains personal data on millions of individuals, including data related to security clearance investigations. In June 2015, OPM reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate but related incident had compromised its systems and the files related to background investigations for 21.5 million individuals. From February 2015 through August 2017, multiple reviews of OPM's information security were conducted. Four reports based on these reviews were issued. The reports contained 80 recommendations for improving the agency's security posture. Chapter 4 reviews relevant documents and artifacts reflecting OPM's actions and progress toward implementing the 80 recommendations contained in the four reports, and assessed the actions against the intent of the recommendations. CDC is responsible for detecting and responding to emerging health threats and controlling dangerous substances. In carrying out its mission, CDC relies on information technology systems to receive, process, and maintain sensitive data. Accordingly, effective information security controls are essential to ensure that the agency's systems and information are protected from misuse and modification. Chapter 5 reviews the extent to which CDC has taken corrective actions to address the previously identified security program and technical control deficiencies and related recommendations for improvement. Federal agencies are dependent on information systems to carry out operations. The risks to these systems are increasing as security threats evolve and become more sophisticated. To reduce the risk of a successful cyberattack, agencies can deploy intrusion detection and prevention capabilities on their networks and systems. Chapter 6 determined the reported effectiveness of agencies' implementation of the government's approach and strategy; the extent to which DHS and OMB have taken steps to facilitate the use of intrusion detection and prevention capabilities to secure federal systems; and the extent to which agencies reported implementing capabilities to detect and prevent intrusions. Recent large-scale data breaches of public and private entities have put hundreds of millions of people at risk of identity theft or other harm. Chapter 7 reviews issues related to consumers' options to address risks of harm from data breaches and examines information and expert views on the effectiveness of consumer options to address data breach risks. While Chapter 8 considers the answer to this question: what legal obligations do Internet companies have to prevent and respond to data breaches? Then discusses several factors Congress might consider when weighing future legislation.

Network Security For Dummies (Paperback): Chey Cobb Network Security For Dummies (Paperback)
Chey Cobb
R667 R468 Discovery Miles 4 680 Save R199 (30%) Ships in 10 - 15 working days

* This hands-on, do-it-yourself guide to securing and auditing a network offers immediate solutions to critical security problems for small- to medium-sized businesses
* Each part of the book begins with basics that can be quickly implemented and then moves on to more complex security mechanisms a company may consider as it grows
* Presents numerous checklists and exercises for performing network security audits
* Includes real-world examples and practical tips for implementing cost-effective security measures
* Companion Web site includes forms and checklists along with links to useful sites and downloads for recommended security tools

Cyber Security in India - Education, Research and Training (Hardcover, 1st ed. 2020): Sandeep Kumar Shukla, Manindra Agrawal Cyber Security in India - Education, Research and Training (Hardcover, 1st ed. 2020)
Sandeep Kumar Shukla, Manindra Agrawal
R3,158 Discovery Miles 31 580 Ships in 7 - 11 working days

This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur. IIT Kanpur's Computer Science and Engineering Department established an 'Interdisciplinary Center for Cyber Security and Cyber Defense of Critical Infrastructures (C3I Center)' in 2016 with funding from the Science and Engineering Research Board (SERB), and other funding agencies. The work at the center focuses on smart grid security, manufacturing and other industrial control system security; network, web and data security; cryptography, and penetration techniques. The founders are involved with various Indian government agencies including the Reserve Bank of India, National Critical Information Infrastructure Protection Center, UIDAI, CCTNS under home ministry, Ministry of IT and Electronics, and Department of Science & Technology. The center also testifies to the parliamentary standing committee on cyber security, and has been working with the National Cyber Security Coordinator's office in India. Providing glimpses of the work done at IIT Kanpur, and including perspectives from other Indian institutes where work on cyber security is starting to take shape, the book is a valuable resource for researchers and professionals, as well as educationists and policymakers.

Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers... Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers (Paperback, 2011 ed.)
Hyoung Joong Kim, Yun Q. Shi, Mauro Barni
R1,767 R1,445 Discovery Miles 14 450 Save R322 (18%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.

Security and Cryptography for Networks - 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010,... Security and Cryptography for Networks - 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings (Paperback, Edition.)
Juan A. Garay, Roberto De Prisco
R2,039 R1,667 Discovery Miles 16 670 Save R372 (18%) Ships in 10 - 15 working days

The7thConferenceonSecurityandCryptographyforNetworks(SCN2010)was heldinAmal?,Italy,during September 13-15,2010.Thisbiennialconferencehas traditionally been held in Amal?, with the exception of the ?fth edition which washeldinnearbyMaiori.Thisyeartheconferencereceivedthe?nancialsupport oftheDepartmentof"InformaticaedApplicazioni"andoftheFacultyofScience of the University of Salerno, Italy. The wide availability of computer networks, and in particular of the global Internet, o?ers the opportunity to perform electronically and in a distributed way a wide range of transactions. Hence, cryptography and security assume an increasingly important role in computer networks, both as critical enablers of new functionalities as well as warrantors of the mechanisms' soundness and safety. The principal aim of SCN as a conference is to bring together researchers in the above ?elds, with the goal of fostering cooperation and exchange of ideas in the stunning Amal? Coast setting. The conference received 94 submissions-a record-high number for the SCN conference series-in a broad range of cryptography and security areas, out of which 27 wereaccepted for publication in these proceedings on the basis of qu- ity, originality, and relevance to the conference's scope. At least three Program Committee(PC)members-outof27world-renownedexpertsintheconference's various areas of interest-reviewed each submitted paper, while submissions - authored by a PC member were subjected to the more stringent evaluation of ?ve PC members.

China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Paperback): Jon R. Lindsay, Tai Ming Cheung,... China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Paperback)
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
R1,006 Discovery Miles 10 060 Ships in 7 - 11 working days

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback):... Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback)
Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
R1,426 R1,227 Discovery Miles 12 270 Save R199 (14%) Ships in 10 - 15 working days

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

Machine Learning for Networking - Second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019,... Machine Learning for Networking - Second IFIP TC 6 International Conference, MLN 2019, Paris, France, December 3-5, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Selma Boumerdassi, Eric Renault, Paul Muhlethaler
R2,637 Discovery Miles 26 370 Ships in 7 - 11 working days

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Machine Learning for Networking, MLN 2019, held in Paris, France, in December 2019. The 26 revised full papers included in the volume were carefully reviewed and selected from 75 submissions. They present and discuss new trends in deep and reinforcement learning, patternrecognition and classi cation for networks, machine learning for network slicingoptimization, 5G system, user behavior prediction, multimedia, IoT, securityand protection, optimization and new innovative machine learning methods, performanceanalysis of machine learning algorithms, experimental evaluations ofmachine learning, data mining in heterogeneous networks, distributed and decentralizedmachine learning algorithms, intelligent cloud-support communications,ressource allocation, energy-aware communications, software de ned networks,cooperative networks, positioning and navigation systems, wireless communications,wireless sensor networks, underwater sensor networks.

Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015,... Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Ion Bica, David Naccache, Emil Simion
R1,302 R1,225 Discovery Miles 12 250 Save R77 (6%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics.

Cryptography and Information Security in the Balkans - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia,... Cryptography and Information Security in the Balkans - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Enes Pasalic, Lars R. Knudsen
R1,460 R1,353 Discovery Miles 13 530 Save R107 (7%) Ships in 10 - 15 working days

This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption.

The Hacker Playbook 2 - Practical Guide To Penetration Testing (Paperback): Peter Kim The Hacker Playbook 2 - Practical Guide To Penetration Testing (Paperback)
Peter Kim
R512 Discovery Miles 5 120 Ships in 7 - 11 working days
Physical and Data-Link Security Techniques for Future Communication Systems (Hardcover, 1st ed. 2016): Marco Baldi, Stefano... Physical and Data-Link Security Techniques for Future Communication Systems (Hardcover, 1st ed. 2016)
Marco Baldi, Stefano Tomasin
R4,759 R3,827 Discovery Miles 38 270 Save R932 (20%) Ships in 10 - 15 working days

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, Italy, in September 2014 within the framework of the research project "Enhancing Communication Security by Cross-layer Physical and Data-link Techniques", funded by the Italian Ministry of Education, Universities, and Research.

Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Aggelos Kiayias, Markulf Kohlweiss, Petros Wallden, Vassilis Zikas
R2,371 Discovery Miles 23 710 Ships in 7 - 11 working days

The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions. They are organized in topical sections such as: functional encryption; identity-based encryption; obfuscation and applications; encryption schemes; secure channels; basic primitives with special properties; proofs and arguments; lattice-based cryptography; isogeny-based cryptography; multiparty protocols; secure computation and related primitives; post-quantum primitives; and privacy-preserving schemes.

ICT and Society - 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 -... ICT and Society - 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, Turku, Finland, July 30 - August 1, 2014, Proceedings (Hardcover, 2014 ed.)
Kai Kimppa, Diane Whitehouse, Tiina Kuusela, Jackie Phahlamohlaka
R3,016 R2,520 Discovery Miles 25 200 Save R496 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th IFIP TC 9 International Conference on Human Choice and Computers, HCC11 2014, held in Turku, Finland, in July/August 2014. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are based on both academic research and the professional experience of information technologists working in the field. They have been organized in the following topical sections: society, social responsibility, ethics and ICT; the history of computing and its meaning for the future; peace, war, cyber-security and ICT; and health, care, well-being and ICT.

Practical Cloud Security - A Guide for Secure Design and Deployment (Paperback): Chris Dotson Practical Cloud Security - A Guide for Secure Design and Deployment (Paperback)
Chris Dotson
R1,013 R669 Discovery Miles 6 690 Save R344 (34%) Ships in 10 - 15 working days

With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. Chris Dotson-an IBM senior technical staff member-shows you how to establish data asset management, identity and access management, vulnerability management, network security, and incident response in your cloud environment.

Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy,... Detection of Intrusions and Malware, and Vulnerability Assessment - 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings (Paperback, 2015 ed.)
Magnus Almgren, Vincenzo Gulisano, Federico Maggi
R2,101 R1,497 Discovery Miles 14 970 Save R604 (29%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.

Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA,... Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings (Paperback, 2015 ed.)
Pierangela Samarati
R2,228 R1,835 Discovery Miles 18 350 Save R393 (18%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference.

GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition (Paperback, 2nd edition): Ric Messier GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition (Paperback, 2nd edition)
Ric Messier
R1,227 R816 Discovery Miles 8 160 Save R411 (33%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Fully updated coverage of every topic on the current version of the GSEC exam Take the Global Information Assurance Certification's challenging GIAC Security Essentials (GSEC) exam with confidence using this thoroughly revised self-study guide. You will explore IT systems roles and learn to perform hands-on cybersecurity tasks. The book covers the latest cybersecurity knowledge areas tested by the GSEC, including virtualization, cloud, and Windows-as-a-Service security. GSEC GIAC Security Essentials All-in-One Exam Guide, Second Edition offers clear explanations of complex concepts that ensure you will be ready for the test. To aid in self-study, each chapter includes a useful summary as well as "Exam Tips" that highlight salient points and practice questions that mimic those on the live test. Beyond exam prep, the book also serves as a valuable on-the-job reference for cybersecurity professionals. *Contains 100% coverage of all GSEC exam objectives*Online content includes full-length practice tests in the Total Tester exam engine and two hours of video training from the author*Written by an information security expert with decades of experience

Critical Infrastructure Security and Resilience - Theories, Methods, Tools and Technologies (Hardcover, 1st ed. 2019): Dimitris... Critical Infrastructure Security and Resilience - Theories, Methods, Tools and Technologies (Hardcover, 1st ed. 2019)
Dimitris Gritzalis, Marianthi Theocharidou, George Stergiopoulos
R2,772 R2,422 Discovery Miles 24 220 Save R350 (13%) Ships in 10 - 15 working days

This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols. Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods. The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.

Advanced Information Systems Engineering Workshops - CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015,... Advanced Information Systems Engineering Workshops - CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings (Paperback, 2015 ed.)
Anne Persson, Janis Stirna
R2,138 R1,513 Discovery Miles 15 130 Save R625 (29%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of seven international workshops held in Stockholm, Sweden, in conjunction with the 27th International Conference on Advanced Information Systems Engineering, CAiSE 2015, in June 2015. The 38 full and nine short papers were carefully selected from 107 submissions. The workshops were the Second International Workshop on Advances in Services Design based on the Notion of Capability (ASDENCA), the Third International Workshop on Cognitive Aspects of Information Systems Engineering (COGNISE), the First International Workshop on Digital Business Innovation and the Future Enterprise Information Systems Engineering (DiFenSE), the First International Workshop on Enterprise Modeling (EM), the First Workshop on the Role of Real-World Objects in Business Process Management Systems (RW-BPMS), the 10th International Workshop on Trends in Enterprise Architecture Research (TEAR), and the 5th International Workshop on Information Systems Security Engineering (WISSE).

Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015,... Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings (Paperback, 2015 ed.)
Ernest Foo, Douglas Stebila
R2,133 R1,509 Discovery Miles 15 090 Save R624 (29%) Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,061 Discovery Miles 10 610
Cryptography - The Key to Digital…
Keith Martin Hardcover R573 R459 Discovery Miles 4 590
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
Wtf Is My Password - Password Book…
Booki Nova Paperback R115 Discovery Miles 1 150
Hacking Exposed Computer Forensics
Aaron Philipp Hardcover R1,591 R1,206 Discovery Miles 12 060
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
Tribe of Hackers - Cybersecurity Advice…
Marcus J. Carey, Jennifer Jin Paperback R498 R355 Discovery Miles 3 550
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850
CompTIA CySA+ Practice Tests - Exam…
Mike Chapple, David Seidl Paperback R933 R552 Discovery Miles 5 520

 

Partners