This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of…
This book provides readers an understanding of the implementation of Enterprise Risk Management (ERM) for international construction operations. In an extended case study, it primarily focuses on Chinese construction firms (CCFs) based in Singapore. In this regard, the book explains the differences and similarities between Risk Management (RM), Project Risk Management (PRM) and ERM in the const…
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are gro…
Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).℗ℓ The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shad…
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gain…
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security h…
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algori…