Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.
Автор: Alencar, Marcelo S., Название: Cryptography and network security / ISBN: 8770224072 ISBN-13(EAN): 9788770224079 Издательство: Taylor&Francis Рейтинг: Цена: 18374.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: It comprises twelve chapters divided into two parts discussing "Non-neutral Evolution on Human Genes" (Part I) and "Evolution of Modern Human Populations" (Part II.)The most significant feature of this book is the continent-wise discussion of modern human dispersal using human genomic data in Part II.
Описание: Nigel Sylvester: GO is the first self-titled book by professional BMX athlete, entrepreneur, YouTube sensation and culture icon - Nigel Sylvester. His GO brand embraces the relentless, unapologetic and graceful pursuit of accomplishing a dream. His globally acclaimed digital film series, GO, captures his style and thrilling adventures in cities around the globe from his POV.
Автор: Gaurav Jaswal; Vivek Kanhangad; Raghavendra Ramachandra Название: AI and Deep Learning in Biometric Security ISBN: 0367422441 ISBN-13(EAN): 9780367422448 Издательство: Taylor&Francis Рейтинг: Цена: 24499.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book focuses on artificial intelligence and deep learning approaches, with case studies to solve problems associated with biometric security such as authentication, spoofing attack detection, and object detection.
Автор: Sabu M. Thampi, Bharat Bhargava, Pradeep K. Atrey Название: Managing Trust in Cyberspace ISBN: 1138374776 ISBN-13(EAN): 9781138374775 Издательство: Taylor&Francis Рейтинг: Цена: 9033.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop.
Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection.
Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.
Автор: Ciampa, Mark Название: Comptia security + guide to network security fundamentals ISBN: 0357424379 ISBN-13(EAN): 9780357424377 Издательство: Cengage Learning Рейтинг: Цена: 16471.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-601 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the seventh edition includes expanded coverage of security evaluations, embedded device and Internet of Things (IoT) security, and cloud and virtualization security.
Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice, while the innovative Information Security Community Site connects you to up-to-the-minute news and insights from the information security field.
Описание: SECURITY ISSUES AND PRIVACY CONCERNS IN INDUSTRY 4.0 APPLICATIONS
Written and edited by a team of international experts, this is the most comprehensive and up-to-date coverage of the security and privacy issues surrounding Industry 4.0 applications, a must-have for any library.
The scope of Security Issues and Privacy Concerns in Industry 4.0 Applications is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trends and the need for technological change in Industry 4.0.
Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT-based health care management systems, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed.
Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library.
Описание: In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the world's communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit.
Описание: Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments.The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation.
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts:
Part 1: Introduction. The world of cyber security and the approach taken in this book.
Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences.
Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each.
Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them.
Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available.
Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book.
Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success.
Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today
Описание: This book introduces all the technical features that make up blockchain technology today.
It starts with a thorough explanation of all technological concepts necessary to understand any discussions related to distributed ledgers and a short history of earlier implementations. It then discusses in detail how the Bitcoin network looks and what changes are coming in the near future, together with a range of altcoins that were created on the same base code. To get an even better idea, the book shortly explores how Bitcoin might be forked before going into detail on the Ethereum network and cryptocurrencies running on top of the network, smart contracts, and more. The book introduces the Hyperledger foundation and the tools offered to create private blockchain solutions. For those willing, it investigates directed acyclic graphs (DAGs) and several of its implementations, which could solve several of the problems other blockchain networks are still dealing with to this day. In Chapter 4, readers can find an overview of blockchain networks that can be used to build solutions of their own and the tools that can help them in the process.
Автор: John Aycock Название: Computer Viruses and Malware ISBN: 1441940162 ISBN-13(EAN): 9781441940162 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: It also looks at the application of malicious software to computer crime and information warfare.Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru