Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments, Hassanien Aboul Ella, Elhoseny Mohamed


Варианты приобретения
Цена: 93160.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 256 шт.  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Hassanien Aboul Ella, Elhoseny Mohamed
Название:  Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments
ISBN: 9783030168391
Издательство: Springer
Классификация:


ISBN-10: 3030168395
Обложка/Формат: Paperback
Страницы: 314
Вес: 0.46 кг.
Дата издания: 14.08.2020
Серия: Advanced sciences and technologies for security applications
Язык: English
Издание: 1st ed. 2019
Иллюстрации: 50 tables, color; 95 illustrations, color; 33 illustrations, black and white; x, 314 p. 128 illus., 95 illus. in color.
Размер: 23.39 x 15.60 x 1.73 cm
Читательская аудитория: Tertiary education (us: college)
Подзаголовок: Challenges and solutions in smart environments
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources.

Cybersecurity and Secure Information Systems

Автор: Aboul Ella Hassanien; Mohamed Elhoseny
Название: Cybersecurity and Secure Information Systems
ISBN: 3030168360 ISBN-13(EAN): 9783030168360
Издательство: Springer
Рейтинг:
Цена: 121110.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.

Social Tagging for Linking Data Across Environments

Автор: Pennington Diane
Название: Social Tagging for Linking Data Across Environments
ISBN: 1783303387 ISBN-13(EAN): 9781783303380
Издательство: Facet
Рейтинг:
Цена: 109120.00 T
Наличие на складе: Нет в наличии.
Описание: This book, representing researchers and practitioners across different information professions, will explore how social tags can link content across a variety of environments.

Theory And Practice Of Cryptography Solutions For Secure Information Syste

Автор: El?i, Pieprzyk, Chefranov, Orgun
Название: Theory And Practice Of Cryptography Solutions For Secure Information Syste
ISBN: 1466640308 ISBN-13(EAN): 9781466640306
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 189420.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: <em>Theory and Practice of Cryptography Solutions for Secure Information Systems</em> explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the <em>Advances in Information Security, Privacy, and Ethics series collection</em>.

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Автор: Dykstra Josiah
Название: Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
ISBN: 1491920947 ISBN-13(EAN): 9781491920947
Издательство: Wiley
Рейтинг:
Цена: 42230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: If you`re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems.

Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

Автор: Issa Traore; Isaac Woungang; Sherif Saad Ahmed; Ya
Название: Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments
ISBN: 3030037118 ISBN-13(EAN): 9783030037116
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the Second International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2018, held in Vancouver, BC, Canada, in November 2018.The 10 full papers were carefully reviewed and selected from 28 submissions. This book also contains the abstracts of two keynote talks and one tutorial. The contributions included in this proceedings cover many aspects of theory and application of effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems and infrastructures, such as botnet detection, secure cloud computing and cryptosystems, IoT security, sensor and social network security, behavioral systems and data science, and mobile computing.

The Complete Guide to Cybersecurity Risks and Controls

Автор: Kohnke
Название: The Complete Guide to Cybersecurity Risks and Controls
ISBN: 1498740545 ISBN-13(EAN): 9781498740548
Издательство: Taylor&Francis
Рейтинг:
Цена: 122490.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations.

The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats.

The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.


Implementing Cybersecurity

Автор: Kohnke
Название: Implementing Cybersecurity
ISBN: 149878514X ISBN-13(EAN): 9781498785143
Издательство: Taylor&Francis
Рейтинг:
Цена: 122490.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing

Автор: Grid Alan
Название: Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing
ISBN: 1914045084 ISBN-13(EAN): 9781914045080
Издательство: Неизвестно
Рейтинг:
Цена: 29430.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Why Straitening Your Cybersecurity is Crucial in 2020 ? If You are Looking to Protect Your Data and Sleep More Peacefully at Night Read On...


Cyber-crime nowadays is continuously rising, and many individuals or smaller businesses are facing problems due to ineffective Cybersecurity, people feel that their data is safe, but even companies are attacked daily. It might be offensive to hear, but most cyber-criminals will have much more expertise than you or your average employee when it comes to digital crime; They can sell your data on the black market or use it for personal goals like: extract your bank information. There are also other personal reasons, such as ego, others appreciation and personal satisfaction.


We've scoured the entire Cybersecurity world, researching the practices of both security experts and ordinary Internet users like ourselves. Our recommendations cover the most significant threats you or your business face and show you the best methods for protecting your identity and personal data.

Each subtopic of this book has been explored in great depth to sensitize you about cybersecurity and how it is going to affect international relations and geopolitical situations across the world.

It covers the following topics:


  • What is Cyber Security?
  • The 5 Most Common Mistakes in Cybersecurity
  • Cyber Attacks and Vulnerabilities
  • Systems That Are Vulnerable to Cyber-Attacks
  • Improving Effectively Your Security
  • What does it mean to be an Ethical Hacker?
  • How to Inhibits Adware


...And much more

This book is for anyone who has an interest in Cybersecurity. You don't need to have any prior knowledge of it . You should just need to have a working knowledge of computers and the internet.

With this guide, we want to give you a simple, effective, and realistic framework for Boosting your Cybersecurity-one that you can achieve quickly.

Ready to Improve Your Cybersecurity? Click "Buy Now"



Challenges in Cybersecurity and Privacy - the European Research Landscape

Автор: Jorge Bernal Bernabe, Antonio Skarmeta
Название: Challenges in Cybersecurity and Privacy - the European Research Landscape
ISBN: 8770220883 ISBN-13(EAN): 9788770220880
Издательство: Taylor&Francis
Рейтинг:
Цена: 93910.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

Build Your Own Cybersecurity Testing Lab: Low-cost Solutions

Автор: Messier Ric
Название: Build Your Own Cybersecurity Testing Lab: Low-cost Solutions
ISBN: 1260458318 ISBN-13(EAN): 9781260458312
Издательство: McGraw-Hill
Рейтинг:
Цена: 44610.00 T
Наличие на складе: Поставка под заказ.
Описание: Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Manage your own robust, inexpensive cybersecurity testing environment

This hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources. Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments fully explains multiple techniques for developing lab systems, including the use of Infrastructure-as-Code, meaning you can write programs to create your labs quickly, without manual steps that could lead to costly and frustrating mistakes. Written by a seasoned IT security professional and academic, this book offers complete coverage of cloud and virtual environments as well as physical networks and automation. Included with the book is access to videos that demystify difficult concepts.

Inside, you will discover how to:

    - Gather network requirements and build your cybersecurity testing lab
    - Set up virtual machines and physical systems from inexpensive components
    - Select and configure the necessary operating systems
    - Gain remote access through SSH, RDP, and other remote access protocols
    - Efficiently isolate subnets with physical switches, routers, and VLANs
    - Analyze the vulnerabilities and challenges of cloud-based infrastructures
    - Handle implementation of systems on Amazon Web Services, Microsoft Azure, and Google Cloud Engine
    - Maximize consistency and repeatability using the latest automation tools



Information Security Management: Global Challenges in the New Millennium

Автор: Dhillon Gurpreet S., Dhillon Gurpreet
Название: Information Security Management: Global Challenges in the New Millennium
ISBN: 1878289780 ISBN-13(EAN): 9781878289780
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 58480.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Presents contributions by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Cybersecurity for Industrial Control Systems

Название: Cybersecurity for Industrial Control Systems
ISBN: 1439801967 ISBN-13(EAN): 9781439801963
Издательство: Taylor&Francis
Рейтинг:
Цена: 84710.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: SCADA (Supervisory Control and Data Acquisition) systems do not necessarily mesh well with standard IT security. Nevertheless, when combined, the two can create heightened levels of protection. This book demonstrates how to develop a SCADA cyber security program.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия